Results 51 to 60 of about 35,630 (203)
Keystroke dynamics in the pre-touchscreen era [PDF]
Biometric authentication seeks to measure an individual’s unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns.
Ahmad, Nasir +2 more
core +4 more sources
The future of periodontology: Emerging technologies and conceptual shifts
Abstract Periodontology is entering a transformative era driven by advances in diagnostics, therapeutics, and digital integration. Emerging technologies and conceptual shifts are currently reshaping the specialty, with a focus on predictive, preventive, and personalized care.
Michael S. Reddy
wiley +1 more source
Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices
Biometric verification has been included in remote user authentication schemes recently. In this paper, we have proposed the use of heartbeat biometrics for its liveness property as a possible defense against spoof attacks in remote authentication ...
Md Saiful Islam
doaj +1 more source
Mapping the subgingival HerBiome and HisBiome over the human healthspan
Abstract Background Understanding the intricate relationship between sex, age, and the oral microbiome is crucial for deciphering the onset and progression of numerous age‐related oral and systemic diseases. Methods Subgingival plaque was collected from 781 periodontally and systemically healthy females and 160 males spanning 0 to 80 years.
Rahul Nikam +3 more
wiley +1 more source
With increasing cybersecurity threats and identity fraud, secure and efficient authentication methods are essential. Traditional authentication systems, such as passwords and keycards, have vulnerabilities, making biometric authentication a promising ...
Javier Andres Esquivias Varela
doaj +1 more source
This paper is targeted in the area of biometric data enabled security by using machine learning for the digital health. The traditional authentication systems are vulnerable to the risks of forgetfulness, loss, and theft.
Song-Kyoo Kim +2 more
doaj +1 more source
Biometrics: Accessibility challenge or opportunity? [PDF]
Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or ...
Ramon Blanco-Gonzalo +3 more
doaj +1 more source
A microstructured PVC‐based tribo‐electromagnetic nanogenerator (TEMNG) enables simultaneous harvesting of biomechanical and ambient electromagnetic energy. The hybrid device achieves high electrical outputs while supporting wearable sensing, gait monitoring, and self‐powered touch interfaces.
Ching‐Te Kuo +4 more
wiley +1 more source
Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core +1 more source
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages ...
Boult, Terrance E., Rudd, Ethan M.
core +1 more source

