Open Access
Issue
SHS Web of Conf.
Volume 92, 2021
The 20th International Scientific Conference Globalization and its Socio-Economic Consequences 2020
Article Number 05009
Number of page(s) 8
Section Collaborative Economics, Digital Platforms and Multimedia
DOI https://doi.org/10.1051/shsconf/20219205009
Published online 13 January 2021
  1. Gereffi, G., Kaplinsky, R. (2001). Introduction: Globalisation, Value Chains and Development. IDS Bulletin, 32(3), 1-8. [Google Scholar]
  2. Helbing, D. (2013). Globally networked risks and how to respond. Nature, 497(7447), 51-59. [CrossRef] [PubMed] [Google Scholar]
  3. Wayman, J. (2003). A Definition of “Biometrics”. Collected works 1997-2000. U.S. National Biometric Test Center. San José State University. [Google Scholar]
  4. Unar, J.A., Seng, W., Abbasi, A. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition., 47(8), 2673-2688. [Google Scholar]
  5. Toro, Ó. F. M., Correa, H. L. (2009). Biometric identification using infrared dorsum hand vein images. Ingeniería e Investigación., 29(1), 90-100. [Google Scholar]
  6. Zhu, Q., Zhang, Z., Liu, N., Sun, H. (2015). Near infrared hand vein image acquisition and ROI extraction algorithm. Optik., 126(24), 5682-5687. [Google Scholar]
  7. Bentez-Restrepo, H. D., Bovik, A. C., Rodriguez Pulencio, C. G. (2017). Image quality assessment to enhance infrared face recognition. In 2017 24th IEEE International Conference on Image Processing (ICIP) (pp. 805-809). IEEE, New York: USA. [Google Scholar]
  8. Smrž, M. (2013). Bezkontaktní měření teploty. Brno. Bachelor thesis. Technical University Brno. Faculty of Electrical Engineering and Communication Technologies. [Google Scholar]
  9. Alyanis, N., Razak, S., Al-Dhaqm, A. (2020). Biometrics authentication techniques: A comparative study. International journal of advanced and applied sciences. 7(9), 97-103. [Google Scholar]
  10. Dahia, G., Jesus, L., Segundo, M. P. (2020). Continuous authentication using biometrics: An advanced review. Wiley interdisciplinary reviews-data mining and knowledge dicsovery. 10(4), Art. No. 1365. [Google Scholar]
  11. Hub, M. (2003). Bezpečnost znalostní autentizace. In Sborník příspěvků 3. mezinárodní konference doktorandů Partipácia doktorandov na vedecko-výskumnej činnosti. (pp. 53-57). Bratislava: Slovakia. [Google Scholar]
  12. Hub, M. (2005). Bezpečnost informací - autentizace. Pardubice: University of Pardubice. [Google Scholar]
  13. Hub, M., Čapek, J. (2011). Security Evaluation of Passwords Used on Internet, Journal of Algorithms & Computational Technology, 5(3), 437-450. [Google Scholar]
  14. Hub, M., Příhodová, K. (2018). The impact of global changes on the security of password authentication. In T. Kliestik (Ed.). Globalisation and Its Socio-Economics Consequences. 18th International Scientific Conference (pp. 2061-2066). Zilina: Slovak Republic. [Google Scholar]
  15. Doucek, P., Pavlicek, L., Sedlacek, J., Nedomova, L. (2020). Adaptation of password strength estimators to a non-English environment-the Czech experience. Computers & security, 95, UNSP 101757. [Google Scholar]
  16. Hub, M., Čapek, J. (2009). Method of Password Security Evaluation. In The 8th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (pp. 401-405). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.