Show simple item record

dc.contributor.authorYayilgan, Sule Yildirim
dc.contributor.authorHovstø, Asbjørn
dc.contributor.authorAlaya Cheikh, Faouzi
dc.contributor.authorAmodei, Anthony
dc.contributor.authorIori, Marc
dc.contributor.authorZaharia, Sandel
dc.contributor.authorIoannidis, Dimos
dc.contributor.authorThorvaldsen, Øystein Espelid
dc.date.accessioned2011-12-01T08:39:12Z
dc.date.available2011-12-01T08:39:12Z
dc.date.issued2011
dc.identifier.citationYayilgan, S. Y. et al. (2011). Group Identification at Border Crossing Points. In: Lecture Notes in Informatics, BIOSIG 2011, Proceedings - International Conference of the Biometrics Special Interest Group; 8.-9. September 2011 in Darmstadt, pp. 291-295. Bonn: Gesellschaft für Informatik.no_NO
dc.identifier.isbn978-3-88579-285-7en_US
dc.identifier.issn1617-5468
dc.identifier.urihttp://hdl.handle.net/11250/142550
dc.descriptionThis is the copy of the book chapter originally published in: Brömme, A., Busch, Ch. (ed.)(2011). Lecture Notes in Informatics, BIOSIG 2011, Proceedings - International Conference of the Biometrics Special Interest Group; 8.-9. September 2011 in Darmstadt. Bonn: Gesellschaft für Informatik. Reprinted with permission from Gesellschaft für Informatik.no_NO
dc.description.abstractIncreasing Passenger flow at Border Crossing Points is an important issue at today’s border crossing points (BCPs) of land, sea and airport. Group Access Control and utilizing biometrics information will help increase passenger throughput and reduce human error in handling passengers erroneously. Using multi modal information for (biometric) group id can provide more robust handling of passengers. On the other hand, connecting various BCPs will help solve some problems related to illegal entries from non-Schengen to Schengen space, laws and health. This paper presents the first relevant concepts and issues of using (biometric) group idea and connecting BCPs.no_NO
dc.publisherGesellschaft für Informatikno_NO
dc.titleGroup Identification at Border Crossing Pointsno_NO
dc.typeChapterno_NO
dc.typePeer revieweden_US
dc.subject.nsiVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424no_NO
dc.source.pagenumber291-295no_NO
dc.source.volume191no_NO
dc.source.journalLecture Notes in Informaticsno_NO


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record