Results 161 to 170 of about 35,630 (203)
Some of the next articles are maybe not open access.

Authentication and Biometrics

2004
Biometrics is often used for establishing trusted communication between two parties to negotiate access to an application. This is also a topic that has been studied in the field of information security for quite a while now. Therefore, in the next sections we introduce some security terms and tools that can be found, for example, in [109,162,208 ...
Ruud M. Bolle   +4 more
openaire   +1 more source

ECG-based biometric authentication using mulscale descriptors: ECG-based biometric authentication

2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS), 2015
ECG-based based human recognition is increasingly becoming a popular modality for biometric authentication. Two important features of ECG signals are liveliness and the robustness against falsification. However, ECG features vary due to muscle flexure, baseline wander, and other sources of noise.
Md. Khayrul Bashar   +2 more
openaire   +1 more source

Secure Continuous Biometric-Enhanced Authentication

2000
Abstract: "Biometrics have the potential to solidify person-authentication by examining unforgeable features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them.
Klosterman, Andrew J.   +1 more
openaire   +1 more source

Live biometric authenticity check

SPIE Proceedings, 2003
ABSTRACT This research defined the underpinning concepts of a system that was highly secure, yet was efficient and non-invasive enough for everyday use. The live biometric authenticity check augmented invariant fingerprints with variable live features offered superior security by combining physical characteristics of the user’s with a passcode ...
Harold H. Szu   +3 more
openaire   +1 more source

Mutual Biometric Authentication

2007
This article addresses another severe threat affecting the security of cellular systems, called pilot aliasing attack. This problem occurred due to pilot code reuse among different cellular carriers.
openaire   +1 more source

Biometric Network Authentication

2006
In this paper we will present some schemes for strengthening network authentication over insecure channels with biometric concepts or how to securely transfer and use biometric characteristics as cryptographic keys. We will show why some current authentication schemes are insufficient and we will present our concepts of biometric hashes and ...
Bača, Miroslav   +2 more
openaire   +1 more source

Emerging trends in biometric authentication

2009 International Conference on High Performance Computing & Simulation, 2009
The main objective of biometrics is to identify or authenticate an individual, given his/her different physical or behavioral characteristics. This approach has already been employed in our daily life in various applications and forms (USB biometric key, access control, ...).
openaire   +1 more source

Multimodal Biometric Authentication

2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023
Pranathi S   +5 more
openaire   +1 more source

Biometric Authentication for Wearables

2018
Wearable technology has seen a substantial growth over the last decade, largely due to the improvements in technology and the realization of its potential applications. Wearable technology includes devices such as smartwatches, smart eyewear, smart bands, smart fabrics, and smart jewelry.
Harin Sellahewa   +2 more
openaire   +1 more source

Biometric Authentication

2011
Jiunn-Liang Lin   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy