完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Liu, Che-Hung | en_US |
dc.contributor.author | Wang, Jen-Sheng | en_US |
dc.contributor.author | Peng, Chih-Chiang | en_US |
dc.contributor.author | Shyu, Joseph Z. | en_US |
dc.date.accessioned | 2019-04-03T06:41:28Z | - |
dc.date.available | 2019-04-03T06:41:28Z | - |
dc.date.issued | 2015-03-25 | en_US |
dc.identifier.issn | 1939-0114 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1002/sec.1020 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/124497 | - |
dc.description.abstract | Since Apple merged with AuthenTec, a leading fingerprint recognition company, in 2012, biometrics has widely been considered to strengthen security and privacy in the network security field. Although biometrics has been applied in specific areas for decades, it has gradually proliferated in customer and mobile electronic products to enhance security and privacy. This study aims to evaluate biometrics through conventional technology assessment considerations combined with viewpoints on the specifics of biometric technologies and then to provide suggestions for selection. To conduct the biometric technology assessment, the fuzzy analytic hierarchy process and non-fuzzy best performance approaches are used. Although the outcomes first indicate that technology assessment should be the key object in selecting biometric technologies, that object is followed by biometric competence and key elements of biometrics. The outcomes also indicate that features of the target technologies should be considered when evaluating them. Additionally, fingerprint recognition, iris recognition, and face recognition are the preferred biometrics in evaluation and selection. Copyright (c) 2014 John Wiley & Sons, Ltd. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | biometrics | en_US |
dc.subject | network security | en_US |
dc.subject | fuzzy analytic hierarchy process | en_US |
dc.subject | best non-fuzzy performance | en_US |
dc.title | Evaluating and selecting the biometrics in network security | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1002/sec.1020 | en_US |
dc.identifier.journal | SECURITY AND COMMUNICATION NETWORKS | en_US |
dc.citation.volume | 8 | en_US |
dc.citation.issue | 5 | en_US |
dc.citation.spage | 727 | en_US |
dc.citation.epage | 739 | en_US |
dc.contributor.department | 科技管理研究所 | zh_TW |
dc.contributor.department | Institute of Management of Technology | en_US |
dc.identifier.wosnumber | WOS:000350273000003 | en_US |
dc.citation.woscount | 2 | en_US |
顯示於類別: | 期刊論文 |