Biometric security for mobile computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric security for mobile computing

Data and computing resource security has become an integral element in the fabric of information systems. Cryptography has formed a foundation for conventional security theoretical frameworks and applications.However, cryptography is based on either knowledge (i.e., what you know) or possession (i.e., what you have). This is a built-in weakness in traditional authentication approaches, as the t...

متن کامل

Mobile Multimodal Biometric System for Security

Among our huge life requirements, the most important requirement which has a vital role in our daily life is the security. Recently using biometrics in the security systems has a wide range of research interests since they provide systems have more efficient, reliable, and secure than the others. In the present time researches for mobile biometric devices are provided with a fingerprint only wh...

متن کامل

Multiple Biometric Security in Cloud Computing

Cloud computing is one of the emerging technologies, that takes network users to the next level. Cloud is a technology where resources are paid per usage rather than owned. One of the biggest challenges in this technology is Security. Though users use service provider’s resources, there is a great level of reluctance from users’ end because of significant security threats packed with this techn...

متن کامل

Text Dependent Speech based Biometric for Mobile Security

Mobile is a powerful data communication media through which confidential information can be exchanged. To communicate to the authorized person and network, biometric is used. In this paper, an efficient speaker recognition technique is proposed to solve the authenticity and security problem for the mobile in noisy environment. An effective feature extraction technique and two different speaker ...

متن کامل

Security Architecture for Federated Mobile Cloud Computing

Mobile cloud computing systems are getting increasingly popular because they can facilitate many new applications, such as opportunistic social computing by smartphone users who happen to be at a scene of importance (e.g., disaster rescue), while possibly uploading compute-heavy tasks to the resource-rich clouds. Federated mobile cloud computing further allows to coordinate and optimize the ser...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2011

ISSN: 1939-0114

DOI: 10.1002/sec.240