Results 141 to 150 of about 220,603 (181)
Some of the next articles are maybe not open access.

Biometric

2015
Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues.
Ajay Rawat, Shivani Gambhir
openaire   +1 more source

Biometrics

ACM SIGCAS Computers and Society, 2010
Odor detection and identification by machines is currently being done to evaluate perfumes, wine, olive, oil, and even find people buried in rubble. Extending body odor detection to authentication may seem far-fetched and unrealistic. Yet such an application is plausible, given that like a fingerprint or iris, the human body odor is unique.
openaire   +2 more sources

Biometric encryption

Biometric Technology Today, 2007
Ann Cavoukian, Alex Stoianov
openaire   +1 more source

Behavioral biometrics & continuous user authentication on mobile devices: A survey

Information Fusion, 2021
Ioannis Stylios   +2 more
exaly  

Biometric Privacy

2011
F. Scotti, S. Cimato, R. Sassi
openaire   +2 more sources

Biometric Identification

Information Systems Security, 1997
openaire   +1 more source

A survey on dorsal hand vein biometrics

Pattern Recognition, 2021
Wei Jia, Bob Zhang, Yang Zhao
exaly  

Touch-dynamics based Behavioural Biometrics on Mobile Devices – A Review from a Usability and Performance Perspective

ACM Computing Surveys, 2021
Elakkiya Ellavarason   +2 more
exaly  

A Complete User Authentication and Key Agreement Scheme Using Cancelable Biometrics and PUF in Multi-Server Environment

IEEE Transactions on Information Forensics and Security, 2021
Hui Zhang, Weixin Bian, Biao Jie
exaly  

Home - About - Disclaimer - Privacy