TITLE

Mind reader

AUTHOR(S)
Pierce, Julia
PUB. DATE
January 2005
SOURCE
Engineer (00137758);1/28/2005, Vol. 293 Issue 7667, p28
SOURCE TYPE
Periodical
DOC. TYPE
Interview
ABSTRACT
Interviews Angela Sasse, professor of Human-Centered Technology at the University College London about the effectiveness of the application of biometrics in passports in Great Britain. Factors limiting the implementation of a national-based system; Problems associated in finding equipment that can be adjusted for wheelchair users; Implication of the use of the system for immigration.
ACCESSION #
15950184

 

Related Articles

  • Palm-print Verification Using Optimized Cepstrum Blocks. Kekre, H.B.; Vig, Rekha; Pranay, Arya; Aashita, Irani; Saurabh, Bisani // International Journal of Research & Reviews in Computer Science;Mar2011, Vol. 2 Issue 2, p470 

    Using biometrics to verify a person's identity has several advantages over the present practices of personal identification numbers (PINs) and passwords. Minutiae-based automated identification systems are more popular, but they are more computationally complex and time consuming. In this paper...

  • Facing the future. Saccomano, Ann // Journal of Commerce (1542-3867);5/26/2003, Vol. 4 Issue 21, p33 

    Deals with the obstacles to the implementation of biometric identification. Absence of international standard for biometric identification; Technological barriers in fingerprinting; Cultural concerns on the use of biometric identification. INSET: How some countries view biometrics.

  • Biometrics: the body's keys. McHale, John // Military & Aerospace Electronics;Dec2003, Vol. 14 Issue 12, p17 

    Focuses on the use of biometrics to enhance secure access control in the U.S. Applications of biometrics in the global war against terrorism; Types of biometrics and their applications in security; Lack of government funding for biometrics research and its implications for efforts to develop...

  • Biometric Identification.  // Foundations & Trends in Communications & Information Theory;2010, Vol. 7 Issue 2/3, p207 

    The article focuses on biometric identification systems based on discrete biometric sources. It states the complexity of identification systems to authentication systems. As stated, privacy leakage is an important parameter of biometric identification systems. It further states that biometric...

  • Why Isn't Biometrics Up and Working?  // World Trade;Jan2007, Vol. 20 Issue 1, p68 

    This article identifies the reasons biometrics identification system is not widely implemented in the U.S. as part of securing the country from terrorists attacks. Some of the reasons why biometrics ID is not up and working are, lack of federally mandated standards for biometric-based...

  • From Casinos to 'Multi-cards' DeBerry, Ron // Security: Solutions for Enterprise Security Leaders;Jul2005, Vol. 42 Issue 7, p18 

    Discusses the different security system methods that center on multi-technology cards including biometrics and smart chips. Personal computer-based approach; Standalone approach; Portable database approach; Integrated template management approach. INSET: Wedded to Embedded.

  • Evaluation of Electrocardiogram for Biometric Authentication. Singh, Yogendra Narain; Singh, S. K. // Journal of Information Security;Jan2012, Vol. 3 Issue 1, p39 

    This paper presents an evaluation of a new biometric electrocardiogram (ECG) for individual authentication. We report the potential of ECG as a biometric and address the research concerns to use ECG-enabled biometric authentication system across a range of conditions. We present a method to...

  • An Overview of the Information-Theoretic Perspectives on Biometric Systems. Yanling Chen; Han Vinck, A. J.; Gligoroski, Danilo; Knapskog, Svein J. // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2011, Issue 21-23, p31 

    In this paper, we give an overview of the information-theoretic perspectives on the newly emerging biometric-based authentication/identification systems, which include perspectives of Shannon's communication channel, Shannon's secrecy system, common randomness of correlated variables, Wyner's...

  • SURVEY OF BIOMETRIC RECOGNITION SYSTEMS AND THEIR APPLICATIONS. SONKAMBLE, SULOCHANA; THOOL, DR. RAVINDRA; SONKAMBLE, BALWANT // Journal of Theoretical & Applied Information Technology;1/1/2010, Vol. 11 Issue 1/2, p45 

    The term Biometrics is becoming highly important in computer security world. The human physical characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics. These features are used to provide an authentication for computer based security systems. The existing...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics