Results 61 to 70 of about 35,630 (203)

Biometric authentication systems: Trends, challenges, and future prospects – A comprehensive review

open access: yesMethodsX
With cyber security concerns high on the list of issues, it is no surprise that demand for secure confidentiality for all users and objects is at an all-time high; at the same time, the development of robust reliable systems for providing confidentiality
Shital Kakade, Umesh Raut
doaj   +1 more source

BIOMETRIC AUTHENTICATION OF STUDENTS TO CONTROL THE LEARNING PROCESS IN ONLINE EDUCATION

open access: yesScientific Journal of Astana IT University, 2022
This article considers the relevant problem of biometric authentication of students in higher educational institutions. The authors present the results of using a turnstile system with a face recognition terminal, with the ability to provide unique ...
D. Muratuly   +3 more
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

open access: yesThe Scientific World Journal, 2014
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over ...
Mengxing Li   +5 more
doaj   +1 more source

A Post-Quantum Fuzzy Commitment Scheme for Biometric Template Protection: An Experimental Study

open access: yesIEEE Access, 2021
The proliferation and extensive acceptance of biometrics in many sectors is due to its merits over traditional password-based authentication. Several biometric template protection schemes have been proposed during the last decade to address the security ...
Alawi A. Al-Saggaf
doaj   +1 more source

From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan   +3 more
wiley   +1 more source

Combining multiple biometrics to protect privacy [PDF]

open access: yes, 2004
As biometrics are gaining popularity, there is increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The association of fingerprints with criminals raises further concerns.
Kholmatov, Alisher Anatolyevich   +2 more
core  

An integrated behavioral change model for smoking cessation in periodontal care: The four‐stage behavioral support staircase

open access: yesPeriodontology 2000, EarlyView.
Abstract Objectives Smoking tobacco is a critical modifiable risk factor for periodontal and peri‐implant diseases. This narrative review integrates established behavioral theories with communication‐based psychological processes to propose an evidence‐based model for smoking cessation support in periodontal care.
Christoph A. Ramseier
wiley   +1 more source

Biometric Authentication Using Fused Multimodal Biometric

open access: yesProcedia Computer Science, 2016
AbstractBiometrics are basically based on the expansion of pattern recognition systems. At present, electronic or optical sensors like cameras and scanning devices are used to capture images, recordings or measurements of a person's ‘unique’ characteristics.
Jagadiswary, D., Saraswady, D.
openaire   +1 more source

The Governance of the European Digital Identity Framework Through the Lens of Institutional Mimesis

open access: yesRegulation &Governance, EarlyView.
ABSTRACT The European Commission's decision to expand its 2014 Regulation on electronic identification and trust services toward wallet‐based digital identities marked a significant shift in the governance of users' digital identities. The intersection between private digital services, public prerogatives, and individual self‐determination raises ...
Linda Weigl, Marta Reysner
wiley   +1 more source

Home - About - Disclaimer - Privacy