標題: Evaluating and selecting the biometrics in network security
作者: Liu, Che-Hung
Wang, Jen-Sheng
Peng, Chih-Chiang
Shyu, Joseph Z.
科技管理研究所
Institute of Management of Technology
關鍵字: biometrics;network security;fuzzy analytic hierarchy process;best non-fuzzy performance
公開日期: 25-Mar-2015
摘要: Since Apple merged with AuthenTec, a leading fingerprint recognition company, in 2012, biometrics has widely been considered to strengthen security and privacy in the network security field. Although biometrics has been applied in specific areas for decades, it has gradually proliferated in customer and mobile electronic products to enhance security and privacy. This study aims to evaluate biometrics through conventional technology assessment considerations combined with viewpoints on the specifics of biometric technologies and then to provide suggestions for selection. To conduct the biometric technology assessment, the fuzzy analytic hierarchy process and non-fuzzy best performance approaches are used. Although the outcomes first indicate that technology assessment should be the key object in selecting biometric technologies, that object is followed by biometric competence and key elements of biometrics. The outcomes also indicate that features of the target technologies should be considered when evaluating them. Additionally, fingerprint recognition, iris recognition, and face recognition are the preferred biometrics in evaluation and selection. Copyright (c) 2014 John Wiley & Sons, Ltd.
URI: http://dx.doi.org/10.1002/sec.1020
http://hdl.handle.net/11536/124497
ISSN: 1939-0114
DOI: 10.1002/sec.1020
期刊: SECURITY AND COMMUNICATION NETWORKS
Volume: 8
Issue: 5
起始頁: 727
結束頁: 739
Appears in Collections:Articles


Files in This Item:

  1. f9a201c78d00fabb298d42dddd1cddea.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.