Title: Evaluating and selecting the biometrics in network security
Authors: Liu, Che-Hung
Wang, Jen-Sheng
Peng, Chih-Chiang
Shyu, Joseph Z.
科技管理研究所
Institute of Management of Technology
Keywords: biometrics;network security;fuzzy analytic hierarchy process;best non-fuzzy performance
Issue Date: 25-Mar-2015
Abstract: Since Apple merged with AuthenTec, a leading fingerprint recognition company, in 2012, biometrics has widely been considered to strengthen security and privacy in the network security field. Although biometrics has been applied in specific areas for decades, it has gradually proliferated in customer and mobile electronic products to enhance security and privacy. This study aims to evaluate biometrics through conventional technology assessment considerations combined with viewpoints on the specifics of biometric technologies and then to provide suggestions for selection. To conduct the biometric technology assessment, the fuzzy analytic hierarchy process and non-fuzzy best performance approaches are used. Although the outcomes first indicate that technology assessment should be the key object in selecting biometric technologies, that object is followed by biometric competence and key elements of biometrics. The outcomes also indicate that features of the target technologies should be considered when evaluating them. Additionally, fingerprint recognition, iris recognition, and face recognition are the preferred biometrics in evaluation and selection. Copyright (c) 2014 John Wiley & Sons, Ltd.
URI: http://dx.doi.org/10.1002/sec.1020
http://hdl.handle.net/11536/124497
ISSN: 1939-0114
DOI: 10.1002/sec.1020
Journal: SECURITY AND COMMUNICATION NETWORKS
Volume: 8
Issue: 5
Begin Page: 727
End Page: 739
Appears in Collections:Articles


Files in This Item:

  1. f9a201c78d00fabb298d42dddd1cddea.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.