Showing 1 - 10 of 2,522
, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate …This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of … citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos …
Persistent link: https://www.econbiz.de/10009188484
assessed against the standards used to justify other forms of security measures. The efficacy of many surveillance schemes … trust, firstly in the assertions of national security and law enforcement agencies, and secondly in the politicians who have …
Persistent link: https://www.econbiz.de/10009188872
This paper presents a novel security architecture for protecting the integrity of facial signature images and templates … signature biometrics consists of two stages: the first stage is for facial signature image protection while the second is for …
Persistent link: https://www.econbiz.de/10012043234
Persistent link: https://www.econbiz.de/10011582163
implications – Conclusions and recommendations are made as to which specific hotel processes might benefit from biometrics and also …, empirical study into customer adoption of biometrics. It reveals opportunities for hotels to profit from emerging biometric …
Persistent link: https://www.econbiz.de/10014762934
, global security concerns, technology enabled, personal identity concerns, standardization concerns, wealth and education … beneficial reasons why national identity programs should be implemented, such as security, convenience, and enhancing CRM …. These issues regarding national identification cards and CRM were addressed through exploratory data reduction analyses …
Persistent link: https://www.econbiz.de/10014824099
between system's components as well as between different biometric systems and a problem of biometric data security and …
Persistent link: https://www.econbiz.de/10012044115
The most challenging issues in cloud computing are access control and data security because users of the cloud … security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out … method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms …
Persistent link: https://www.econbiz.de/10012044942
Persistent link: https://www.econbiz.de/10012513782
Persistent link: https://www.econbiz.de/10012520006