Security threats of finger print biometric in network system environment
Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand,...
| Main Authors: | Taha, Imad, Ahmad, Mohammad A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Design for Scientific Renaissance
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/2865/ http://irep.iium.edu.my/2865/1/17.pdf |
Similar Items
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Scale free network analysis of a large crowd through their
spatio-temporal activities
by: Ahmad, Akhlaq, et al.
Published: (2016)
by: Ahmad, Akhlaq, et al.
Published: (2016)
Information security threat avoidance behavior: an
empirical investigation
by: Ling, Zhixuan
Published: (2019)
by: Ling, Zhixuan
Published: (2019)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
An evaluation of photonic switching network
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
Hybrid model of post-processing techniques for Arabic optical character recognition
by: Habeeb, Imad Qasim
Published: (2016)
by: Habeeb, Imad Qasim
Published: (2016)
A survey of photonic switching network
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
iSpeechNews:s real time speech news service for ubiquitous computing environment
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
A novel associative memory approach to speech enhancement
in a vehicular environment
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
Improving the deployment of broadband content delivery using an open access approach in a high speed broadband environment in the Klang Valley
by: Ismail, Zahid
Published: (2011)
by: Ismail, Zahid
Published: (2011)
Network device ad-blocker
by: Mohamad, Juhaina, et al.
Published: (2020)
by: Mohamad, Juhaina, et al.
Published: (2020)
Collaborative disaster management system: an exploratory for landslide in Malaysia
by: AlMohaifer, Mohammad Salem, et al.
Published: (2011)
by: AlMohaifer, Mohammad Salem, et al.
Published: (2011)
An information retrieval system for Quranic texts: a proposed system design
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
by: Noordin, Mohamad Fauzan, et al.
Published: (2006)
Mixed Reality CAD System
by: Abdullah, Che Zulkhairi, et al.
Published: (2015)
by: Abdullah, Che Zulkhairi, et al.
Published: (2015)
Wireless sensor networks for developing countries: First International Conference, WSN4DC 2013 Jamshoro, Pakistan, April 2013 revised selected papers
Published: (2013)
Published: (2013)
Collaboration, communities, well-beings and information systems
Published: (2011)
Published: (2011)
Malaysia petrol subsidize authorization card system
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Interactive Online Learning (IOL) collaborative system
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Management disaster for charity donation system to Malaysian community
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Health-care Collaborative System:(HCCS): a concept
by: Zamzami, Ikhlas, et al.
Published: (2011)
by: Zamzami, Ikhlas, et al.
Published: (2011)
MIS: mommies information system
by: Kasim, Shahreen, et al.
Published: (2017)
by: Kasim, Shahreen, et al.
Published: (2017)
Touch-less palm print biometric system
by: Michael Goh Kah, Ong, et al.
Published: (2008)
by: Michael Goh Kah, Ong, et al.
Published: (2008)
Assessing audience response systems using task-technology fit
by: Mantikayan, Jonathan Mamangkiang, et al.
Published: (2013)
by: Mantikayan, Jonathan Mamangkiang, et al.
Published: (2013)
Collaboration system towards Program Anak Emas in Malaysia (SPANE)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Customer relationship management approach for MyFamily system: a framework
by: Kamaruddin, Zaleha, et al.
Published: (2013)
by: Kamaruddin, Zaleha, et al.
Published: (2013)
1 touch I-care system: collaborative web-based solution
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Mosque-based Collaborative Healthcare System (MCHS): Malaysia case study
by: Hassan, Azizah, et al.
Published: (2011)
by: Hassan, Azizah, et al.
Published: (2011)
Community Landslide Collaboration system (COL) for disaster prevention, mitigation and preparedness
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
A concept study on community-based disaster management system in Malaysia
by: Ajayi, Binyamin, et al.
Published: (2011)
by: Ajayi, Binyamin, et al.
Published: (2011)
Collaborative healthcare system: a citizen-centric and whole-of-government approach in healthcare
by: Abdulatif, Zaidoon Khalil, et al.
Published: (2011)
by: Abdulatif, Zaidoon Khalil, et al.
Published: (2011)
Similar Items
-
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016) -
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al. -
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014) -
Super Authentication Security System (SASS) to Malaysian community for safety management
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011) -
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)