Results 151 to 160 of about 35,630 (203)

Enhanced smart commuting with artificial intelligence for intelligent health and safety monitoring in school buses. [PDF]

open access: yesSci Rep
Hossam H   +8 more
europepmc   +1 more source

MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM

open access: yesInternational Research Journal of Modernization in Engineering Technology and Science
openaire   +1 more source

Biometric Authentication

YMER Digital, 2022
Progresses in the field of Information Technology likewise make Information Security an indivisible piece of it. To manage security, Authentication assumes a significant part. This paper presents a survey on the biometric confirmation strategies and some future conceivable outcomes in this field.
Abhishek Jha, Ashish A, Lalita Verma
openaire   +1 more source

Biometric Authentication

2009
For ages, humans recognized themselves according to different characteristics (appearance, behavior…). Biometrics is a well known technique to identify an individual or verify its identity; as, for example, fingerprints have been used for more than 100 years to identify one criminal. With computers, this analysis can be realized very quickly and with a
Mahier, Julien   +3 more
openaire   +2 more sources

Biometric Authentication

Computer, 2006
In this age of digital impersonation, biometric techniques are being used increasingly as a hedge against identity theft. The premise is that a biometric - a measurable physical characteristic or behavioral trait - is a more reliable indicator of identity than legacy systems such as passwords and PINs.
openaire   +1 more source

Biometric Authentication using Soft Biometric Traits

2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), 2018
For secure computing and networking systems in the modern day, passwords and physical tokens alone do not serve a major purpose in a user's authentication. Traditional systems of security including the biometric systems, authenticate individuals at the time of login only and no further identification or verification is performed during the activity ...
Rishabh Garg   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy