Results 51 to 60 of about 35,630 (203)

Keystroke dynamics in the pre-touchscreen era [PDF]

open access: yes, 2013
Biometric authentication seeks to measure an individual’s unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns.
Ahmad, Nasir   +2 more
core   +4 more sources

The future of periodontology: Emerging technologies and conceptual shifts

open access: yesJournal of Periodontology, EarlyView.
Abstract Periodontology is entering a transformative era driven by advances in diagnostics, therapeutics, and digital integration. Emerging technologies and conceptual shifts are currently reshaping the specialty, with a focus on predictive, preventive, and personalized care.
Michael S. Reddy
wiley   +1 more source

Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Biometric verification has been included in remote user authentication schemes recently. In this paper, we have proposed the use of heartbeat biometrics for its liveness property as a possible defense against spoof attacks in remote authentication ...
Md Saiful Islam
doaj   +1 more source

Mapping the subgingival HerBiome and HisBiome over the human healthspan

open access: yesJournal of Periodontology, EarlyView.
Abstract Background Understanding the intricate relationship between sex, age, and the oral microbiome is crucial for deciphering the onset and progression of numerous age‐related oral and systemic diseases. Methods Subgingival plaque was collected from 781 periodontally and systemically healthy females and 160 males spanning 0 to 80 years.
Rahul Nikam   +3 more
wiley   +1 more source

Optimizing Biometric Security in Industry 4.0 A Critical Analysis of Authentication Parameters and Their Impacts Using Multi-Criteria Methods

open access: yesNova Scientia
With increasing cybersecurity threats and identity fraud, secure and efficient authentication methods are essential. Traditional authentication systems, such as passwords and keycards, have vulnerabilities, making biometric authentication a promising ...
Javier Andres Esquivias Varela
doaj   +1 more source

An Enhanced Machine Learning-Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms

open access: yesIEEE Access, 2019
This paper is targeted in the area of biometric data enabled security by using machine learning for the digital health. The traditional authentication systems are vulnerable to the risks of forgetfulness, loss, and theft.
Song-Kyoo Kim   +2 more
doaj   +1 more source

Biometrics: Accessibility challenge or opportunity? [PDF]

open access: yesPLoS ONE, 2018
Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or ...
Ramon Blanco-Gonzalo   +3 more
doaj   +1 more source

Tribo‐Electromagnetic Nanogenerator Based on Microstructured Polyvinyl Chloride Layer for Enhanced Hybrid Energy Harvesting and Intelligent Health Monitoring

open access: yesSmall, EarlyView.
A microstructured PVC‐based tribo‐electromagnetic nanogenerator (TEMNG) enables simultaneous harvesting of biomechanical and ambient electromagnetic energy. The hybrid device achieves high electrical outputs while supporting wearable sensing, gait monitoring, and self‐powered touch interfaces.
Ching‐Te Kuo   +4 more
wiley   +1 more source

Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]

open access: yes, 2019
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core   +1 more source

CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition

open access: yes, 2016
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages ...
Boult, Terrance E., Rudd, Ethan M.
core   +1 more source

Home - About - Disclaimer - Privacy