TITLE

Is This Document the Real Deal?

AUTHOR(S)
Bassett, Jackie
PUB. DATE
January 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on disruptive approaches aimed to solve document security challenges in the U.S. These include biometrics, an identity management and authentication method, which record security that is being adopted and the emerging technologies that empower it. It is suggested that biometric data needs to be recoverable to better protect it. The adoption of anti-forensics of the innovation in employing disruptive approaches is also discussed.
ACCESSION #
28632783

 

Related Articles

  • Getting the 411 on Biometrics.  // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p48 

    Provides information on biometrics technology, the reading of a unique human physical attribute as data which is then applied to actuating a system. Passwords and personal identification numbers; Fingerprinting; Retinal scans; Capabilities of the BioMetric Fingerprint BLP-100 Pressure Sensitive...

  • VETTING VENDORS, SOOTHING CUSTOMERS. Fest, Glen // Bank Technology News;Sep2006, Vol. 19 Issue 9, p22 

    The article discusses the authentication solutions to resolve the problems in commercial fraud and identity thief in the U.S. Banks are concerned with the improvement of the banks' data security system to avoid setbacks due to fraudulent acts. Among the authentication tools are the scratch card,...

  • Crytosystem for Computer security using Iris patterns and Hetro correlators. Bremananth, R.; Sharieh, Ahmad // International Journal of Advanced Computer Science & Application;Nov2011, Vol. 2 Issue 11, p1 

    Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper...

  • UNCOERCIBILITY IN E-VOTING AND E-AUCTIONING MECHANISMS USING DENIABLE ENCRYPTION. Howlader, Jaydeep; Nair, Vivek; Basu, Saikat; Mal, A. K. // International Journal of Network Security & Its Applications;Mar2011, Vol. 3 Issue 2, p97 

    The uncoercibility to prevent rigging in e-voting and e-auction have been studied in different literatures. It is realized that the notion of a virtual booth and untappable channel are required to prevent coerciveness. Virtual booth protects the candidates to cast their private values without...

  • Fingerprints: A solution to protect your PHI. Robinson, David S. // MGMA Connection;Jul2015, Vol. 15 Issue 5, p22 

    The article focuses on the use of fingerprints to avoid the possible breach in protected health information (PHI). Topics discussed include the dilemma of using password logins in healthcare settings, how the fingerprint authentication system works, and the advantages of using the biometric...

  • From Casinos to 'Multi-cards' DeBerry, Ron // Security: Solutions for Enterprise Security Leaders;Jul2005, Vol. 42 Issue 7, p18 

    Discusses the different security system methods that center on multi-technology cards including biometrics and smart chips. Personal computer-based approach; Standalone approach; Portable database approach; Integrated template management approach. INSET: Wedded to Embedded.

  • Hirsch Electronics.  // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p58 

    The article features the corporate profile of Hirsch Electronics Corp. in the U.S. It mentions that this company is known for manufacturing wide array of technological products, particularly security systems and their equipment. In addition, the company produces various security products...

  • Combining Biometrics with ESSO.  // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article presents the advantages of combining a biometrics with ESSO solution. A biometric-enabled ESSO solution matches each user by correlating against known set of references taking into account. The solution captures images at higher speeds resulting in less image blur distortion. The...

  • A Survey on Iris Recognition. Birgale, Lenina; Kokare, Manesh // IUP Journal of Electrical & Electronics Engineering;Oct2009, Vol. 2 Issue 4, p7 

    As the demand for security systems is increasing exponentially day by day, there has been a rigorous search for different verification and identification techniques. Facial features, voice patterns, hand geometry, retinal patterns, vein patterns, signature dynamics, voice verification, facial...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics