12.07.2015 Views

buletin ştiin ific - Facultatea de Stiinte Economice - Universitatea din ...

buletin ştiin ific - Facultatea de Stiinte Economice - Universitatea din ...

buletin ştiin ific - Facultatea de Stiinte Economice - Universitatea din ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Problems of biometric methods in Authentication and Authorization Infrastructures[10] Peacock, A.; Ke, X.; Wilkerson, M.: “Typing Patterns: A Key to User I<strong>de</strong>nt<strong>ific</strong>ation”, IEEESecurity and Privacy, No. 5, Vol. 2, (2004) 40-47.[11] Ratha, N. K.; Connell, J. H.; Bolle, R. M.: “Enhancing security and privacy in biometricsbasedauthentication systems”, IBM Systems Journal, Volume 40, Number 3, 2001.[12] Schläger, C.; Sojer, M.; Muschall, B.; Pernul, G.: „Attribute-Based Authentication andAuthorisation Infrastructures for E-Commerce Provi<strong>de</strong>rs“, pp 132-141 Springer-Verlag, 2006.[13] Spillane, R. J.: “Keyboard apparatus for personal i<strong>de</strong>nt<strong>ific</strong>ation”, IBM Technical DisclosureBulletin, Bd. 17, Nr. 11, (1975) 3346.[14] Stein, L.; Stewart John, “WWW Security FAQ”, 2003, http://www.w3.org/Security/Faq/wwwsf1.html, retrieved 01.03.2008.[15] Syverson, P.: “A Taxonomy of Replay Attacks”, Procee<strong>din</strong>gs of the Computer SecurityFoundations Workshop VII, Franconia NH, 1994, IEEE CS Press (Los Alamitos, 1994).21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!