Sie sind auf Seite 1von 1

BIBLIOGRAPHY

[1] K. J., Connolly, "Law of Internet Security and Privacy," Aspen Publishers, ISBN978-
0-7355-4273-0, 2003.
[2] S. Convery,"Network Security Architectures,"Cisco Press, 2004. [3] J. A., Hong and S.
Pankanti, "Biometric Identification," Communications of the ACM, 43(2), p. 91-98. DOI
10.1145/328236.328110, 2000.
[4] A.C., Weaver, "Biometric Authentication," Computer, 39 (2), p. 96-97. DOI:
10.1109/MC.2006.47, 2006.
[5] A. K., Jain, R.,Bolle, S. and Pankanti, S., (Editors), "Biometrics: Personal Identification
in Networked Society," Kluwer Academic Publications. ISBN: 978-0-7923-8345-1, 1999.
[6] S., SoyujKumar; M. Prasanna and S.R, Choubisa, "Multimodal Biometric Person
Authentication : A Review," IETE Technical Review 29 (1): 54. DOI:10.4103/0256-
602.93139, 2012.
[7] A., Jain, L., Hong, and S., Pankanti, "Biometric Identification," Communications of
the ACM, 43(2), p. 91-98. DOI 10.1145/328236.328110, 2000.
[8] J. A. K., Ross and A. A. N., Karthik"Introduction to Biometrics," Springer. pp. 122.
ISBN 978-0-387-71040-2, 2008.
[9] A.C. Weaver, "Biometric Authentication," Computer, 39 (2), p. 96-97. DOI:
10.1109/MC, 2006.
[10] L.C., Jain, (Editors.), "Intelligent Biometric Techniques in Fingerprint
and Face Recognition," Boca Raton, FL: CRC Press, 1999.

Das könnte Ihnen auch gefallen