نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

2003
Sanaul Hoque Hossam Selim W. Gareth J. Howells Michael C. Fairhurst Farzin Deravi

A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the proposed model is represented in a hierarchical structure. Associated ‘metadata’ describes the flexible hierarchy with the scope of dynamically restructuring the tree at runtime. All useful functionals can also be included w...

2016
Cory Sabol William Nick Maya Earl Joseph Shelton Albert C. Esterline

The WebID protocol solves the challenge of remembering usernames and passwords. We enhance this protocol in three ways. First, we give it the ability to manage groups of agents and control their access to resources on the Web. Second, we add support for biometric access control to enhance security. Finally, we add support for OWL-based policies that may be federated and result in flexible acces...

Journal: :Intell. Data Anal. 2003
Francesco Bergadano Daniele Gunetti Claudia Picardi

Typing rhythms are the rawest form of data stemming from the interaction between users and computers. When properly sampled and analyzed, they may become a useful tool to ascertain personal identity. Moreover, unlike other biometric features, typing dynamics have an important characteristic: they still exist and are available even after an access control phase has been passed. As a consequence,...

Journal: :CAIS 2006
Moshe Zviran Zippy Erlich

Computer-based information systems in general, and Internet e-commerce and e-business systems in particular, employ many types of resources that need to be protected against access by unauthorized users. Three main components of access control are used in most information systems: identification, authentication, and authorization. In this paper we focus on authentication, which is the most prob...

2008
Valery Korzhik

Alice y(password) ? f(.) – one way function Important remark: With the use of one-way function it is assumed that " y " is distributed trully randomly. Otherwise – nothing is taken for granted. Defects of this approach: • Good password can be forgotten by Alice, • Storing of password in memory increases the risk of its theft, • Short password can be easy memorized but it can be easy found by ad...

2016
Mohamed Hasan Yasushi Makihara Daigo Muramatsu Yasushi Yagi

This paper introduces the Gait Gate as the first online walkthrough access control system based on multimodal biometric person verification. Face, gait and height modalities are simultaneously captured by a single RGB-D sensor and fused at the matching-score level. To achieve the real-time requirements, mutual subspace method has been used for the face matcher. An acceptance threshold has been ...

2010
Ahmed Al-Khazzar Nick Savage

Biometric mechanisms of authentication are becoming a popular approach to securing computer systems, networks and other critical resources. This paper proposes a behavioural authentication system based on user interaction with computer games. Literature about current physical and behavioural biometric methods is reviewed and game based authentication design and implementation issues are discuss...

2018

Dependable verification of individuals has transformed into a fundamentally valuable service in a scope of regions, in police or military settings as well as in non-military personnel (civilian) applications, for example, money related exchanges methodology or access control too. Traditional authentication systems rely on either knowledge, such as a password or a PIN number or possession such a...

2015
Kiran Gupta

Biometric is used in computer science as a form of identification and access control. Out of all techniques of biometric finger vein extraction is most effective method. The paper describes the various research done on finger vein till date. We are using a unique combination of the curvature points and mathematical curve analysis along with the minutiae point extraction methods for veins biomet...

2010
V. S. Meenakshi G. Padmavathi

personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person's biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biometric template is very crucial. Crypto biometric...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید