Search Results

There are 17017 results for: content related to: SHOSHANA AMIELLE MAGNET , When Biometrics Fail: Gender, Race, and the Technology of Identity . Durham and London : Duke University Press , 2001 , 224 p.

  1. BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 123–138, Alper Kanak and Ibrahim Sogukpinar

    Article first published online : 5 OCT 2012, DOI: 10.1002/sec.626

  2. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 727–739, Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1020

  3. The Emergence of Biometrics and Its Effect on Consumers

    Journal of Consumer Affairs

    Volume 39, Issue 2, Winter 2006, Pages: 314–338, JEFF LANGENDERFER and STEFAN LINNHOFF

    Article first published online : 1 SEP 2005, DOI: 10.1111/j.1745-6606.2005.00017.x

  4. BODY, BIOMETRICS AND IDENTITY

    Bioethics

    Volume 22, Issue 9, November 2008, Pages: 488–498, EMILIO MORDINI and SONIA MASSARI

    Article first published online : 14 OCT 2008, DOI: 10.1111/j.1467-8519.2008.00700.x

  5. Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 63–89, Harry Wechsler

    Article first published online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00538.x

  6. Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 37–61, Ann Cavoukian, Michelle Chibba and Alex Stoianov

    Article first published online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00537.x

  7. From Identity Verification to Behavior Prediction: Ethical Implications of Second Generation Biometrics

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 21–36, Margit Sutrop and Katrin Laas-Mikko

    Article first published online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00536.x

  8. A New Development Technology? South Asian Biometrics and the Promise of State Security and Economic Opportunity

    Geography Compass

    Volume 9, Issue 10, October 2015, Pages: 539–549, Jennifer L. Fluri, Paul S. B. Jackson and Dinesh Paudel

    Article first published online : 26 OCT 2015, DOI: 10.1111/gec3.12230

  9. PLAYFUL BIOMETRICS: Controversial Technology through the Lens of Play

    The Sociological Quarterly

    Volume 52, Issue 4, Fall 2011, Pages: 528–547, Ariane Ellerbrok

    Article first published online : 4 OCT 2011, DOI: 10.1111/j.1533-8525.2011.01218.x

  10. Biometrics

    Standard Article

    Wiley Encyclopedia of Biomedical Engineering

    Ting Ma, Yan Zhang and Yuang-Ting Zhang

    Published Online : 14 APR 2006, DOI: 10.1002/9780471740360.ebs0164

  11. Biometric Authentication

    Standard Article

    The Internet Encyclopedia

    James. L. Wayman

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie007

  12. BIOMETRICS, IDENTIFICATION AND SURVEILLANCE

    Bioethics

    Volume 22, Issue 9, November 2008, Pages: 499–508, DAVID LYON

    Article first published online : 14 OCT 2008, DOI: 10.1111/j.1467-8519.2008.00697.x

  13. Cash at Your Fingertips: Biometric Technology for Transfers in Developing Countries

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 91–117, Alan Gelb and Caroline Decker

    Article first published online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00539.x

  14. No Identification Without Representation: Constraints on the Use of Biometric Identification Systems

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 5–20, Emilio Mordini and Andrew P. Rebera

    Article first published online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00535.x

  15. Guilty Bodies, Productive Bodies, Destructive Bodies: Crossing the Biometric Borders

    International Political Sociology

    Volume 1, Issue 2, June 2007, Pages: 149–164, CHARLOTTE EPSTEIN

    Article first published online : 14 MAY 2007, DOI: 10.1111/j.1749-5687.2007.00010.x

  16. You have free access to this content
    Global Identity Policies and Technology: Do we Understand the Question?

    Global Policy

    Volume 1, Issue 2, May 2010, Pages: 209–215, Edgar A. Whitley and Gus Hosein

    Article first published online : 7 MAY 2010, DOI: 10.1111/j.1758-5899.2010.00028.x

  17. Biometric Devices

    Standard Article

    Wiley Encyclopedia of Forensic Science

    Rikkert Zoun

    Published Online : 15 SEP 2009, DOI: 10.1002/9780470061589.fsa451

  18. A secure biometric authentication based on PEKS

    Concurrency and Computation: Practice and Experience

    Yue Zhang, Jing Qin and Lihua Du

    Article first published online : 5 JUN 2015, DOI: 10.1002/cpe.3539

  19. Protect biometric data with compound chaotic encryption

    Security and Communication Networks

    Charles Z. Liew, Raymond Shaw and Lanlan Li

    Article first published online : 15 AUG 2014, DOI: 10.1002/sec.1070

  20. Identification with encrypted biometric data

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 548–562, Julien Bringer, Hervé Chabanne and Bruno Kindarji

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.206