نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

2006
Umut Uludag Michael Farmer Miguel Figueroa-Villanueva Mrityunjay Kumar Pavan Mallapragada Shailesh Saini Silviu Minut Steve Krawczyk Unsang Park

SECURE BIOMETRIC SYSTEMS By Umut Uludag Traditional personal authentication systems that are based on knowledge (e.g., password) or physical tokens (e.g., ID card) are not able to meet strict security performance requirements of a number of modern applications. These applications generally make use of computer networks (e.g., Internet), affect a large portion of population, and control financia...

Journal: :Journal of Applied Security Research 2021

Health records data security is one of the main challenges in e-health systems. Authentication essential services to support stored confidentiality, integrity, and availability. This research focuses on secure storage patient medical healthcare sector where unauthorized access an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming can slow down re...

Journal: :Global Policy 2021

Abstract The sheer size of the Indian population and its presence in a gigantic biometrics database has made possible appropriation control millions bodies on an everyday basis. It is being done at different levels by players operating Digital State, with markets‐based approach aiming to provide governance development entitlements, healthcare one among them. However, receiving end this appropri...

2012
Abdallah Meraoumia Salim Chitroub Ahmed Bouridane

The rapid development in many applications for some different areas, such as public security, access control and surveillance, requires reliable and automatic personal recognition for effective security control. Traditionally, passwords (knowledge-based security) and ID cards (token-based) have been used. However, security can be easily breached when a password is divulged or a card is stolen; ...

2013
Genesis Ajah

Security systems play an important role in the protection of lives and investment. The aim of this project is to design an efficient and cheap security system, which is accessible from any part of the world through the internet, and can be employed in every facet of the economy. This is achieved by incorporating various subsystems (such as surveillance, intruder control, access control, fire de...

2013
B. Srinivasan

Electronic passports (e-passports) are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris). A pa...

2004

OVERVIEW: An access-control system that applies tracking technology to control the movement of people and goods inside buildings has been developed. This system — whose key components are a newly developed, ultralow-power-consumption infrared transmitter/receiver and a weakradio-wave RFID (radio-frequency identification) tag that can handle infrared and RFID signals at the same time — can preci...

Journal: :Advances in transdisciplinary engineering 2022

Biometrics is an alternative solution to the old means of identity verification, such as access cards. However, monomodal biometric systems suffer from multiple limitations, noise introduced by sensor and non-universality. Multi-biometrics allows us overcome these problems thus obtain better performance. Multimodal biometrics, using deep learning, has recently gained interest over single modali...

2010
John C. Stewart Kirk M. Anne

Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. We suggest that keystroke biometric systems can play a role in access control for purposes of identity management systems in conjunction wit...

2010
NGUYEN Thi Hoang Lan NGUYEN Van Toan

— In a network, for remote accessing to a database server (DB Server) user usually has an account with a username and a password. But in fact, the password can be lost, cracked, stolen and the authentication process can be attacked (man-inthe-middle attack...). Current approach for BioPKI system based on physiological characteristics of persons, known as biometrics, provide solutions to securit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید