Методы биометрической аутентификации. Макаревич О.Б - 55 стр.

UptoLike

55
16. 9.A ?.&. ?.)( 6 ;. '.:',
1989. – 250 .
17. •( -.&., ' @.?., •( 8.g. 9)2 =
(.)( 3(. .1. – (: (
2A A( '@ 9, 1997. – 175 c.
18. . /.0., \ @.'., '() *.+. 0 ( 2 6
 3( .=  . // &,. 
  )-()( .
«83. ,6• 9 ». : 9 2000. –
55 – 60 .
19. '() *.+., \ @.'., . /.0. 0.  3(
 ,6  (6. 3( (.
//g(.<2: 96,(, ., 2001. 7,8. 82 – 86 c.
20. @ /.&.   . – '.: g(, 1969.
21. . >. '.)( .2 (. '.: ', 1975.
22. 9, -.9., _3 9.@. a3 ,,( )2= . '.,
"9 6", 1981.
23. '( :., > ?. - (6 ). '.: "&6", 1980.
302 .
24. ?=. g., 9 .9. *2 ,6  ,,(
32=  / 0. .; 0 . 8.+.\.(. '.: &6,
1980.
25. Neural Networks A comprehensive foundation, Simon Haykin, Prentice Hall,
1998.
26. M.W. Mak, W.G. Allen, G.G. Sexton Speaker identification using multilayer
perceptrons and radial basis function networks, Neurocomputing, 1994. 6.
27. Becket @. Introduction to cryptology and PC security. McGrow-Hill, London,
1997.
28. DigitalPersona White Paper Guide to Fingerprint Identification,
http://www.digitalpersona.com/Technology/fingerprint.html
.
29. DigitalPersona Technical White Paper Enterprise Security Architecture for
Biometric User Authentification systems,
http://www.digitalpersona.com/Technology/security.html
.
30. SentryCom technology white paper,
http://www.voiceprove.com/technology_all.htm
.