Editors:
Up-to-date results
Fast track conference proceedings
State-of-the art report
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6005)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICEB: International Conference on Ethics and Policy of Biometrics
Conference proceedings info: ICEB 2010.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (20 papers)
-
Front Matter
-
Privacy Protection and Challenges
-
Legal Challenges
-
Engineering and Social Challenges
-
Ethical and Medical Concerns
-
Policy Issues and Deployments in Asia
-
Challenges in Large Scale Biometrics Identification
About this book
Keywords
- authentication
- biometric encryption
- biometry
- encryption
- ethics
- identity
- privacy
- security
- trust
- algorithm analysis and problem complexity
Editors and Affiliations
-
Biometrics Research Laboratory, Department of Electrical Engineering, Indian Institute of Technology Delhi, New Delhi, India
Ajay Kumar
-
Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
David Zhang
Bibliographic Information
Book Title: Ethics and Policy of Biometrics
Book Subtitle: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010
Editors: Ajay Kumar, David Zhang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-12595-9
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-12594-2Published: 23 April 2010
eBook ISBN: 978-3-642-12595-9Published: 09 May 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: VIII, 169
Number of Illustrations: 15 b/w illustrations
Topics: Computer Communication Networks, Cryptology, Programming Techniques, IT Operations, Algorithms, Computers and Society