نتایج جستجو برای: biometric study

تعداد نتایج: 3975701  

2010
Christian Rathgeb Andreas Uhl

Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of controlling access. The increasing demand for high security applications has led to a growing interest in biometrics. As a result several two-factor authentication systems are designed to include biometric authentication. I...

Journal: :journal of insect biodiversity and systematics 0
mohsen mehrparvar department of biodiversity institute of science and high technology and environmental sciences graduate university of advanced technology 7631133131 kerman, iran

in this study, two aphid species i.e. macrosiphoniella vallesiacae jörg & lample, 1988 on artemisia aucheri and a. sieberi and uroleucon pilosellae (börner, 1933) (hem.: aphididae) on scorzonera sp. were collected which are reported here for the first time from iran. the biometric data of the iranian populations of these two aphid species are given. an identification key to the apterous vivipar...

2010
N. Radha S. Karthikeyan

The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to ...

Journal: :EBRI issue brief 2015
Paul Fronstin M Christopher Roebuck

 Data from a large employer that offered financial incentives to encourage participation in its wellness program are analyzed in this paper. It examines how the characteristics of first-time, wellness-program participants changed with the enhancement of financial incentives for health-risk assessments (HRA) and biometric screenings. Those who completed an HRA or biometric screening in the two ...

2012
K. Ram Kumar

Biometric verification system is the crux of almost every security mechanism these days and failure of a biometric system can lead to grievous issues. The objective of this study is to identify the consequences when biometric verification fails during ATM transaction and hence suggest a novel enhancement mechanism for it. The security of ATM transactions can be further strengthened using the PI...

2014
G. Radhamani G. R. Damodaran

Multimodal biometrics technology that uses more than two sorts of biometrics data has been universally applied for person certification and proof. Researchers have advised that the ear may have benefits over the face for biometric recognition. In this study, a technique for face and ear recognition has suggested. The face image and ear images are prearranged as input. From the pre-processed inp...

2009
Ileana Buhan Jeroen Breebaart Jorge Guajardo Koen de Groot Emile Kelkboom Anton H. M. Akkermans

Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems are deployed at different pl...

2012
Ewa Syta Michael J. Fischer Abraham Silberschatz Gina Gallegos Bryan Ford Gina Gallegos García

Biometric authentication offers many benefits ranging from strong security guarantees to user convenience, however, remote authentication poses unique challenges which are not fully addressed by biometrics alone. We propose a new remote authentication protocol that combines possessionbased authentication and biometrics in a way that conquers the main weaknesses of both authentication methods. O...

2017

This paper discusses several Biometric scan technologies: finger-scan, facialscan and retinal-scan. We discuss the recent history of Biometrics and how it has been influenced by such pseudo-sciences as Phrenology, the study of human skull characteristics and Anthropometry, the study of human body measurement. We discuss how finger-scan technology was influenced by French and British police adva...

2011
Radha Narayanan

Biometric scheme are being widely employed because their security merits over the earlier authentication system based on records that can be easily lost, guessed or forged. High scale employments and the related template storage have increased the requirement to guard the biometric data stored in the system. Theft of biometric information is a negotiation of the user’s privacy. In Addition, the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید