首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
4.
The telecoms sector holds the promise of massive revenues for the biometrics industry. But before this dream can be realised a lot of marketing, technical and mindset changes need to occur.  相似文献   

5.
6.
September’s terrorist attacks on the US once again raised the profile of airport and airline security. In this month’s guest features, Mike Dell, Biometric Technology Manager at Neurodynamics, and Calum Bunney, Director of International Biometric and Authentication Consulting examine the role that biometrics could have in future aviation security scenarios.  相似文献   

7.
8.
9.
Smart card chips are increasingly being used to store and match biometric templates. In the near future, however, the security bar will be raised even further as fingerprint sensors are placed on the smart cards themselves. At this point the combined market for smart cards and biometrics could really blossom.  相似文献   

10.
11.
12.
13.
Following a successful working partnership, Precise Biometrics and Schlumberger have renewed an existing technical agreement and detailed how the companies will work closer in the future.This is a short news story only. Visit www.compseconline.com for the latest computer security industry news  相似文献   

14.
15.
16.
Lyon D 《Bioethics》2008,22(9):499-508
Governing by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This 'solution' to difficulties of verification is described and some technical weaknesses are discussed. The role of biometrics in classification systems is also considered and is shown to contain possible prejudice in relation to racialized criteria of identity. Lastly, the culture of biometric identification is shown to be limited to abstract data, artificially separated from the lived experience of the body including the orientation to others. It is proposed that creators of national ID systems in particular address these crucial deficiencies in their attempt to provide new modes of verification.  相似文献   

17.
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号