Biometric security for mobile computing
نویسندگان
چکیده
منابع مشابه
Biometric security for mobile computing
Data and computing resource security has become an integral element in the fabric of information systems. Cryptography has formed a foundation for conventional security theoretical frameworks and applications.However, cryptography is based on either knowledge (i.e., what you know) or possession (i.e., what you have). This is a built-in weakness in traditional authentication approaches, as the t...
متن کاملMobile Multimodal Biometric System for Security
Among our huge life requirements, the most important requirement which has a vital role in our daily life is the security. Recently using biometrics in the security systems has a wide range of research interests since they provide systems have more efficient, reliable, and secure than the others. In the present time researches for mobile biometric devices are provided with a fingerprint only wh...
متن کاملMultiple Biometric Security in Cloud Computing
Cloud computing is one of the emerging technologies, that takes network users to the next level. Cloud is a technology where resources are paid per usage rather than owned. One of the biggest challenges in this technology is Security. Though users use service provider’s resources, there is a great level of reluctance from users’ end because of significant security threats packed with this techn...
متن کاملText Dependent Speech based Biometric for Mobile Security
Mobile is a powerful data communication media through which confidential information can be exchanged. To communicate to the authorized person and network, biometric is used. In this paper, an efficient speaker recognition technique is proposed to solve the authenticity and security problem for the mobile in noisy environment. An effective feature extraction technique and two different speaker ...
متن کاملSecurity Architecture for Federated Mobile Cloud Computing
Mobile cloud computing systems are getting increasingly popular because they can facilitate many new applications, such as opportunistic social computing by smartphone users who happen to be at a scene of importance (e.g., disaster rescue), while possibly uploading compute-heavy tasks to the resource-rich clouds. Federated mobile cloud computing further allows to coordinate and optimize the ser...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2011
ISSN: 1939-0114
DOI: 10.1002/sec.240