Security considerations in the use of biometric devices.
Marek Rejman-GreenePublished in: Inf. Secur. Tech. Rep. (1998)
Keyphrases
- biometric data
- biometric systems
- biometric template
- user authentication
- authentication systems
- fuzzy vault
- information security
- security systems
- border control
- intrusion detection
- access control
- biometric authentication
- biometric recognition
- mobile devices
- identity verification
- network security
- security issues
- mobile applications
- security requirements
- security threats
- computer security
- ubiquitous computing environments
- palmprint
- mobile agent system
- biometric identification
- wireless sensor
- security policies
- security protocols
- statistical databases
- pattern recognition
- embedded systems
- computer networks
- intrusion detection system
- sensor networks
- rfid tags
- security problems
- network services
- security level
- smart phones
- cyber attacks
- cyber security
- homeland security
- key management
- sensitive data