Методы биометрической аутентификации. Макаревич О.Б - 54 стр.

UptoLike

54
1. Nasdaq Index descriptions, Nasdaq Computer Index,
http://www.2.com/reference/IndexDescriptions.stm
.
2. Nasdaq Computer Index Dynamics,
http://dynamic.2.com/dynamic/comp_0.stm
.
3. Richard Power, 2002 CSI/FBI Computer Crime and Security Survey,
http://www.gocsi.com/press/20020407.html
.
4. Anil J. Kain and Ruud Bolle and Sharath Pankanti. BIOMETRIC: Personal
identification in networked society, Kluwer Academic Publichers, 1999.
5. Aka Monster. &( shared- Internet,
http://secret.times.lv/Secret/sharedscan.html
.
6. Rik Farrow. NOT MORE SECRET PASSWORDS,
www.spirit.com/Network/net0101.html
.
7. =)( 3( eToken R2, eToken PRO, eToken RIC,
http://www.aladdin.ru/index.php?id=103
.
8. Secret Disk New Generation, http://www.aladdin.ru/index.php
.
9. >2 A  6;2 3.,
http://www.aladdin.ru/index.php?id=3
.
10. 8 ?.8. +.)( 3( )  .(
62= :. – 06: 86- 06.  . - , 2000.
11. = ,.)( 3(, http://www.biometrics.ru
.
12. Simon Liu, Mark Silverman. A Practical Guide to Biometric Security
Technology, http://www.computer.org/itpro/homepage/Jan_Feb/security3.htm
.
13. '() *.+., . /.0.  . ( (<)
3.   ,.)( 3( // 2 V
': )-()( (3 "83.
,6".: 9 2003.
14.  ?.8., . /.0., \ @.'. ' 3(
6   .= (  // '2
 )-=)( (3 «?(2 ,.2
6 :6:   .2= )2= =
A». 9--, 1999. – 202 .
15. . /.0., \ @.'., '() *.+. &.
3( ,t(   // ' 2  )-
()( . «83. ,6• 9».
: 9 1999. – 133 – 140 .