نتایج جستجو برای: biometric attributes

تعداد نتایج: 76224  

2010
N. Goranin A. Cenys

Wide usage of biometric information for person identity verification purposes, terrorist acts prevention measures and authentication process simplification in computer systems has raised significant attention to reliability and efficiency of biometric systems. Modern biometric systems still face many reliability and efficiency related issues such as reference database search speed, errors while...

Journal: :Eureka: Physics and Engineering 2021

Biometric systems gather information from the person's biometric attributes, used extensively to authorize individuals. Due obvious convenience of using specific individual traits such as face, fingerprints, palm veins, and irises, authentication is becoming more common. In particular, Iris are in high demand for high-assurance applications, because they contain a broad feature set remain stabl...

Journal: :I. J. Network Security 2005
Deholo Nali Carlisle M. Adams Ali Miri

Threshold attribute-based encryption (thABE) is a variant of identity-based encryption which views identities as sets of descriptive attributes. If a thABE ciphertext c is computed for a set ω of attributes, then, to decrypt c, a user must have keys associated with a sufficiently large subset of ω. One application of thABE is biometric-based access control (BBAC). Practical BBAC applications im...

Journal: :Revista Brasileira De Fruticultura 2022

Abstract The umbu tree is an endemic species and found in the Brazilian semi-arid. Umbu highly appreciated for its socioeconomic importance significant diversity of quality attributes. This study aims to explore color-related variations between matrices, evaluate correlation main biometric attributes quality. With this, 14 matrices were explored at commercial ripening stage submitted colorimetr...

A. Hashemi M. Gaffari S. Bakhshalizadeh, SH. Jafari,

The present study investigated basic statistics for biometric traits as well as non-genetic factors that may affect these traits in the Moghani breed of sheep. The data-set was computed by using biometric records of the Moghani sheep breeding and raising station over a period of 15 years (1996 to 2012). Year of birth, month of birth, birth type and lamb's sex and dam permanent environment were ...

2017
Bart Preneel

Widespread use of biometric architectures implies the need to secure highly sensitive data to respect the privacy rights of the users. In this paper, we discuss the following question: To what extent can biometric designs be characterized as Privacy Enhancing Technologies? The terms of privacy and security for biometric schemes are defined, while current regulations for the protection of biomet...

2012
Raymond Veldhuis

What information is available in biometric features besides that needed for the biometric recognition process? What if a biometric feature contains Personally Identifiable Information? Will the whole biometric system become a threat to privacy? This paper is an attempt to quantifiy the link between biometrics and privacy. For a number of biometric-personal(ity) combinations, the availability, d...

2008
Eugen LUPU Petre G. POP

Biometric systems allow automatic person recognition based on physical or behavioral features which belong to a certain person. Each biometric feature has its limits and no biometric system is perfect so unimodal biometric systems raise a variety of problems. To over fulfilling some of the mentioned inconvenient and limitations and to increase the level of security the multimodal biometric syst...

2017
Sherin Zafar

This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric pe...

2013
Geetika Manavjeet Kaur

Biometric systems play an important role in authenticating the identity of an individual. Such authenticated systems are still prone to attacks and securing them is an important issue. To overcome this, biometric based authentication is blended with cryptography resulting in a framework called fuzzy vault which provides a high level of security. Fuzzy vault is a biometric cryptosystem used for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید