Anda di halaman 1dari 3

Reference list

Journal
Krasmann, S. and Kühne, S., 2014. 'My fingerprint on Osama's cup'. On objectivity and the role
of the fictive regarding the acceptance of a biometric technology. Surveillance & Society, 12(1),
p.1.
Akhmetov, B., Doszhanova, A., Ivanov, A., Kartbayev, T. and Malygin, A., 2013, January.
Biometric technology in securing the Internet using large neural network technology.
In Proceedings of World Academy of Science, Engineering and Technology (No. 79, p. 2046).
World Academy of Science, Engineering and Technology (WASET).
Labati, R.D., Genovese, A., Piuri, V. and Scotti, F., 2013, July. Accurate 3D fingerprint virtual
environment for biometric technology evaluations and experiment design. In Computational
Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA),
2013 IEEE International Conference on (pp. 43-48). IEEE.
Kumar, S.S., 2016. Multimodal Biometric Technology Using Fuzzy Logic Decision and Fuzzy
Inference System. Asian Journal of Computer Science and Technology, 5(2), pp.1-4.
Eze, S.G. and Chijioke, E.O., 2016. Public Enlightenment Education on the Acceptance of
Fingerprint Biometric Technology for Administration in Academic Institutions and Other
Organizations. Journal of Education and Practice, 7(28), pp.158-163.
Adewole, K.S., Abdulsalam, S.O., Babatunde, R.S., Shittu, T.M. and Oloyede, M.O., 2014.
Development of fingerprint biometric attendance system for non-academic staff in a tertiary
institution. Development, 5(2), pp.62-70.
Unar, J.A., Seng, W.C. and Abbasi, A., 2014. A review of biometric technology along with
trends and prospects. Pattern recognition, 47(8), pp.2673-2688.
Byun, S. and Byun, S.E., 2013. Exploring perceptions toward biometric technology in service
encounters: a comparison of current users and potential adopters. Behaviour & Information
Technology, 32(3), pp.217-230.
Krasmann, S. and Kühne, S., 2014. 'My fingerprint on Osama's cup'. On objectivity and the role
of the fictive regarding the acceptance of a biometric technology. Surveillance & Society, 12(1),
p.1.
Akhmetov, B., Doszhanova, A., Ivanov, A., Kartbayev, T. and Malygin, A., 2013, January.
Biometric technology in securing the Internet using large neural network technology.
In Proceedings of World Academy of Science, Engineering and Technology (No. 79, p. 2046).
World Academy of Science, Engineering and Technology (WASET).
Labati, R.D., Genovese, A., Piuri, V. and Scotti, F., 2013, July. Accurate 3D fingerprint virtual
environment for biometric technology evaluations and experiment design. In Computational
Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA),
2013 IEEE International Conference on (pp. 43-48). IEEE.
Cappelli, R., Ferrara, M., Franco, A. and Maltoni, D., 2015. Fingerprint verification competition
2006. Biometric Technology Today, 15(7), pp.7-9.
Davies, S.G., 2016. Touching Big Brother: How biometric technology will fuse flesh and
machine. Information Technology & People, 7(4), pp.38-47.
Ryan, R., 2013. The importance of biometric standards. Biometric Technology Today, 2009(7),
pp.7-10.
Moore, A.M., 2015. Biometric technologies—an introduction. Biometric Technology
Today, 15(1), pp.6-7.
Liu, S. and Silverman, M., 2016. A practical guide to biometric security technology. IT
Professional, 3(1), pp.27-32.
Schroeder, C.C., ID Tec, SL and ID Tec SL, 2015. Biometric security process for authenticating
identity and credit cards, visas, passports and facial recognition. U.S. Patent 5,787,186 A.
Steinberg, E. and Prilutsky, Y., FotoNation, Inc., 2014. Digital camera with biometric security.
U.S. Patent 6,433,818.
Hamid, L. and Freedman, G.S., Activcard Ireland Limited, 2013. Biometric security encryption
system. U.S. Patent 6,498,861.
Faundez-Zanuy, M., 2016. Biometric security technology. IEEE Aerospace and Electronic
Systems Magazine, 21(6), pp.15-26.
Book:
Das, R., 2014. Biometric Technology: Authentication, Biocryptography, and Cloud-based
Architecture. CRC press.
Chirillo, J. and Blaul, S., 2013. Implementing biometric security. Hungry Minds, Incorporated.
Jain, A., Bolle, R. and Pankanti, S. eds., 2016. Biometrics: personal identification in networked
society (Vol. 479). Springer Science & Business Media.
Tuyls, P. and Kevenaar, T. eds., 2014. Security with noisy data: on private biometrics, secure
key storage and anti-counterfeiting. Springer Science & Business Media.
Vielhauer, C., 2015. Biometric user authentication for IT security: from fundamentals to
handwriting (Vol. 18). Springer Science & Business Media.

(Unar et al. 2014)


(Byun and Byun, 2013)
(Krasmann and Kühne, 2014)
(Akhmetov et al. 2013)
(Labati et al. 2013)
(Cappelli et al. 2015)
(Davies, 2016)
(Ryan, 2013)
(Moore, 2015)
(Liu and Silverman, 2016)
(Schroeder et al. 2015)
(Steinberg et al. 2014)
(Hamid et al. 2013)
(Faundez-Zanuy, 2016)
(Das, 2014)
(Chirillo and Blaul, 2013)
(Jain et al. 2016)
(Tuyls and Kevenaar, 2014)
(Vielhauer, 2015)
(Krasmann and Kühne, 2014)
(Akhmetov et al. 2013)
(Labati et al. 2013)
(Kumar, 2016)
(Eze and Chijioke, 2016)
(Adewole et al. 2014)

Anda mungkin juga menyukai