Using Fingerprint Authentication to Reduce System Security: An Empirical Study.
Hugh WimberlyLorie M. LiebrockPublished in: IEEE Symposium on Security and Privacy (2011)
Keyphrases
- fingerprint authentication
- random number generator
- smart card
- security requirements
- access control
- security mechanisms
- security issues
- statistical databases
- information security
- computer security
- high security
- security policies
- security systems
- intrusion detection
- functional requirements
- cyber security
- authentication protocol
- security level
- security problems
- security management
- security measures
- real time