![]() However, since these devices are as any network host with IP and MAC addresses, they may be the targets of malicious network users. Currently, most biometrics readers are able to connect to wired and wireless networks and communicate with remote biometric servers to exchange biometric data. They play an important role in implementing the security policies within institutions.īiometric reader manufacturers have been focusing on offering easy-to-use and practical devices with effective costs, low enrollment and recognition time, and low rate of false match and non-match. Nowadays, biometrics readers, such as fingerprint, face, and iris, are deployed in many public sites and are used for user identification and verification. ![]() ![]() It is unquestionable that the use of biometric technologies is becoming increasingly common. ![]() Keywords: Component fingerprint reader iris reader biometrics readers denial of service attack (DoS) WCCAIS’2014 1 Introduction
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |