Authentication Scheme using Biometrics in Intelligent Vehicle Network

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Biometrics Based Authentication Scheme Using Watermarking

Authentication is the demonstration of confirming reality of a quality of a datum or substance. For Robust Authentication using a Biometric verification which is considered a subset of biometric authentication. It can be particularly recognized through one or all the more recognizing natural qualities, for example, fingerprints. This paper proposed the concept of Embedding and Extracting the En...

متن کامل

Iris Biometrics Authentication Scheme using Watermarking and SVD

Late innovative movement has made it simple for interrupter to adjust the sight and the sound substance transmitted over the network. digital watermarking is a procedure, where computerized implanting of the copyright information or watermark into the information to be ensured or secured. The two noteworthy ways or methods of doing that assurance are spatial area and the powerful change space. ...

متن کامل

Efficient Biometrics Remote User Authentication Scheme

Recently, bio-information has been playing an important role in modern user authentication schemes. In 2004, Lin and Lai proposed a flexible biometrics remote user authentication scheme. However, their scheme is vulnerable and cannot provide mutual authentication between user and remote system. Hence, Khan and Zhang improved the security of a flexible biometrics remote user authentication schem...

متن کامل

A Survey on Biometrics based Key Authentication using Neural Network

s The conventional method for user authentication is a password known to the user only. There is no security in the use of passwords if the password is known to an imposter and also it can be forgotten. So it is necessary to develop a better security system. Hence, to improve the user authentication passwords are replaced with biometric identification of the user. Thus usage of biometrics in au...

متن کامل

Intelligent Home Network Authentication: Home Device Authentication Using Device Certification

The intelligent home network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As home network service is popularized, the interest in home network security is going up. Many people interested in home network security usually consider user authentication and authorization. But the consideration...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Convergence Society

سال: 2013

ISSN: 2233-4890

DOI: 10.15207/jkcs.2013.4.3.015