Results 161 to 170 of about 35,630 (203)
Some of the next articles are maybe not open access.
2004
Biometrics is often used for establishing trusted communication between two parties to negotiate access to an application. This is also a topic that has been studied in the field of information security for quite a while now. Therefore, in the next sections we introduce some security terms and tools that can be found, for example, in [109,162,208 ...
Ruud M. Bolle +4 more
openaire +1 more source
Biometrics is often used for establishing trusted communication between two parties to negotiate access to an application. This is also a topic that has been studied in the field of information security for quite a while now. Therefore, in the next sections we introduce some security terms and tools that can be found, for example, in [109,162,208 ...
Ruud M. Bolle +4 more
openaire +1 more source
ECG-based biometric authentication using mulscale descriptors: ECG-based biometric authentication
2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS), 2015ECG-based based human recognition is increasingly becoming a popular modality for biometric authentication. Two important features of ECG signals are liveliness and the robustness against falsification. However, ECG features vary due to muscle flexure, baseline wander, and other sources of noise.
Md. Khayrul Bashar +2 more
openaire +1 more source
Secure Continuous Biometric-Enhanced Authentication
2000Abstract: "Biometrics have the potential to solidify person-authentication by examining unforgeable features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them.
Klosterman, Andrew J. +1 more
openaire +1 more source
Live biometric authenticity check
SPIE Proceedings, 2003ABSTRACT This research defined the underpinning concepts of a system that was highly secure, yet was efficient and non-invasive enough for everyday use. The live biometric authenticity check augmented invariant fingerprints with variable live features offered superior security by combining physical characteristics of the users with a passcode ...
Harold H. Szu +3 more
openaire +1 more source
Mutual Biometric Authentication
2007This article addresses another severe threat affecting the security of cellular systems, called pilot aliasing attack. This problem occurred due to pilot code reuse among different cellular carriers.
openaire +1 more source
Biometric Network Authentication
2006In this paper we will present some schemes for strengthening network authentication over insecure channels with biometric concepts or how to securely transfer and use biometric characteristics as cryptographic keys. We will show why some current authentication schemes are insufficient and we will present our concepts of biometric hashes and ...
Bača, Miroslav +2 more
openaire +1 more source
Emerging trends in biometric authentication
2009 International Conference on High Performance Computing & Simulation, 2009The main objective of biometrics is to identify or authenticate an individual, given his/her different physical or behavioral characteristics. This approach has already been employed in our daily life in various applications and forms (USB biometric key, access control, ...).
openaire +1 more source
Multimodal Biometric Authentication
2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023Pranathi S +5 more
openaire +1 more source
Biometric Authentication for Wearables
2018Wearable technology has seen a substantial growth over the last decade, largely due to the improvements in technology and the realization of its potential applications. Wearable technology includes devices such as smartwatches, smart eyewear, smart bands, smart fabrics, and smart jewelry.
Harin Sellahewa +2 more
openaire +1 more source

