2017 Annual Conference on New Trends in Information &Amp; Communications Technology Applications (NTICT) 2017
DOI: 10.1109/ntict.2017.7976150
|View full text |Cite
|
Sign up to set email alerts
|

Use fingerprint technology in developing country security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 2 publications
0
2
0
1
Order By: Relevance
“…The simplicity of the proposed device affects its ease of development by different institutions where the approximate manufacturing cost around 100 dollars. This simplicity makes it cheaper as well as it is compatible with the android system "open source", on the contrary with other different systems considered expensive and mainly used paid operating system [18], [19].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The simplicity of the proposed device affects its ease of development by different institutions where the approximate manufacturing cost around 100 dollars. This simplicity makes it cheaper as well as it is compatible with the android system "open source", on the contrary with other different systems considered expensive and mainly used paid operating system [18], [19].…”
Section: Resultsmentioning
confidence: 99%
“…Connections with external networks done by the control PC (lap top) only which consider the first wall protection that increase the security for the proposed device. In other hand, other devices depend on connecting the fingerprint device to the external networks using network card, which could affect the security and make them high risk to breakthrough [19], [20]. Furthermore the proposed device depends on a temporary communication channels with the device to send and receive biometric data, after that the system disconnect immediately so become harder to hack.…”
Section: Resultsmentioning
confidence: 99%
“…Por lo mencionado anteriormente se identifican las condiciones que favorecen su implementación como lo son perdurabilidad (no presenta variaciones en los usuarios al transcurrir el tiempo), cuantificación (se puede expresar numéricamente) [2][3], unicidad (identificador único para cada usuario) y universalidad (todos los usuarios la poseen) [4]. Al tener como parámetro que cumple con las condiciones anteriores, se procede a definir las categorías de procesamiento biométrico dactilar que se aplican en el proyecto, como lo son identificación y autentificación.…”
Section: Introductionunclassified