Authentication and Biometrics

  • Ruud M. Bolle
  • Jonathan H. Connell
  • Sharath Pankanti
  • Nalini K. Ratha
  • Andrew W. Senior
Chapter
Part of the Springer Professional Computing book series (SPC)

Abstract

Biometrics is often used for establishing trusted communication between two parties to negotiate access to an application. This is also a topic that has been studied in the field of information security for quite a while now. Therefore, in the next sections we introduce some security terms and tools that can be found, for example, in [109,162,208]. Indeed we take the liberty of following Chapter 4 of [162] fairly closely.

Keywords

Credit Card Authentication Protocol Authentication System Knowledge Token Authentication Method 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2004

Authors and Affiliations

  • Ruud M. Bolle
    • 1
  • Jonathan H. Connell
    • 1
  • Sharath Pankanti
    • 1
  • Nalini K. Ratha
    • 1
  • Andrew W. Senior
    • 1
  1. 1.IBM T.J. Watson Research CenterHawthorneUSA

Personalised recommendations