Management Strategies of Information Assurance Utilizing Biometrics Authentication via Wireless Bio-Aesthitires of Endysis or Emphyteusis
Management Strategies of Information Assurance Utilizing Biometrics Authentication via Wireless Bio-Aesthitires of Endysis or Emphyteusis
出处
《通讯和计算机(中英文版)》
2012年第12期1372-1382,共11页
Journal of Communication and Computer
参考文献16
-
1S.S. Kumar, C. Tarun, S.R. Mahadeva, Multimodal biometric person authentication: A review, IETE Technical Review 29 (2012) 54-75.
-
2J. Kwak, A. Willse, K. Matsumura, M.C. Opiekun, W. Yi, Genetically-based olfactory signatures persist despite dietary variation, PLoS ONE 3 (2008) 3591.
-
3International Human Genome Sequencing Consortium. Finishing the euchromatic sequence of the human genome. Nature 45 (2004) 431-931.
-
4J.J. Alec, W. Victoria, T.S. Lay, Hypervariable minisatellite regions in human DNA, Nature 314 (1985) 67-73.
-
5J.M. Butler, Forensic DNA Typing: Biology Technology and Genetics of STR Markers, Elsevier, New York, 2005.
-
6J.M. Butler, E. Buel, F. Crivellente, B.R. McCord, Forensic DNA typing by capillary electrophoresis using the ABI prism 310 and 3100 genetic analyzers for STR analysis, Electrophoresis 25 (2004) 397-412.
-
7M.A. Jobling, P. Gill, Encoded evidence: DNA in forensic analysis, Nature Reviews Genetics 5 (2004) 739-51.
-
8P. Gill, Role of short tandem repeat DNA in forensic casework in the UK-past present and future perspectives, BioTechniques 32 (2002) 366-72.
-
9J.W. Schumm, J.W. Bacher, Materials and methods for identifying and analyzing intermediate tandem repeat DNA markers, U.S. Patent 6 (2001) 238-863.
-
10J.M. Wallin, C.L. Holt, K.D. Lazaruk, T.H. Nguyen, Constructing universal multiplex PCR systems for comparative genotyping, Journal of Forensic Science 47 (2002) 52-65.
-
1陈华平,陈清.信息与信息技术基础设施的新一代安全——关于Cyber Security and Information Assurance[J].信息安全与通信保密,2006(11):14-17. 被引量:1
-
2沈峰,杨飞,袁余良,潘金贵.动态手写签名验证技术概述[J].计算机科学,2003,30(3):92-95. 被引量:5
-
3风河率先推出市场首套通过CC EAL4+安全认证的嵌入式Linux平台[J].计算机安全,2011(6):5-5.
-
4王斌.网络安全专业[J].大学生,2012(2):134-134. 被引量:1
-
5LIJie,WANGRu-chuan.Study of the Improvement on Network Management Performance with Mobile Agent[J].The Journal of China Universities of Posts and Telecommunications,2003,10(3):11-16. 被引量:9
-
6吴志军,杨义先.信息化进程的研究[J].计算机科学,2010,37(4):11-14. 被引量:3
-
7工作站、各种应用的计算机系统[J].电子科技文摘,2003,0(6):118-120.
-
8郭宝龙,李晖.信息保障与安全热点技术[J].国际学术动态,2010(5):45-46.
-
9A.Gellrich,M.Ernst,等.Managing and Ever Increasing Number of Linux—PCs at DESY[J].International Conference on Computing in High Energy and Nuclear Physics,2001(1):83-84.