نتایج جستجو برای: biometrics access control
تعداد نتایج: 1614058 فیلتر نتایج به سال:
Mobile devices have consistently advanced in terms of processing power, amount of memory and functionality. With these advances, the ability to store potentially private or sensitive information on them has increased. Traditional methods for securing mobile devices, passwords and PINs, are inadequate given their weaknesses and the bursty use patterns that characterize mobile devices. Passwords ...
The project entitled “Credit Card Endorsement Using Biometrics in Cloud Computing” is based on the security issues related to data access and data storage in cloud computing. The application focused is on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transactio...
Think of withdrawing cash from an automatic teller machine (ATM). What if a thief steals your ATM card and comes to know your personal identification number (PIN)? For many secure buildings, access is restricted to bearers of an appropriate magnetic swipe card or a radio frequency identification (RFID) tag. But what if that RFID tag or swipe card falls into the wrong hands? Similarly, when we l...
در این تحقیق یک روش نوین برای شناسایی خودکار هویت با استفاده از تصاویر سه بعدی چهره ارائه می¬شود. سیستم شناسایی مذکور قادر به شناسایی هویت تصاویر چهره با حالت مختلف(شادی، تعجب، خشم و ...) می¬باشد. علاوه بر این از آنجائیکه در تصاویر سه¬بعدی اطلاعات عمق هیچ ارتباطی به نور محیط ندارد و مختصات سوم شبکه سه¬بعدی که همان اطلاعات مربوط به سطح صورت است کاملا نسبت به نور مستقل می¬باشد، دقت شناسایی روش پی...
In the digital world, biometrics is used for authentication or recognition to examine and confirm a person's distinguishing physical behavioral attributes. There are many systems available today that use iris, fingerprint, face features identification verification. Face recognition-based most popular since they don't always need user's assistance, more automated, simple use. paves way an innova...
Access control, a task of managing permission or denial to the use of particular resources by particular entities, is achieved by credentials such as passwords and physical keys. Although security of access control has extensively been studied, researchers have not paid much attention to comparing costs of the systems with different credentials. This paper provides a general model of doorkey ma...
Access control is an important security issue in particular because of terrorist threats. Access points are increasingly becoming equipped with advanced input sensors often based on biometrics, and with advanced intelligent methods that learn from experience. We have designed a flexible modular system based on integration of arbitrary access sensors and an arbitrary number of stand-alone module...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Biometrics is gaining strong support for access control in the industry. It is not uncommon for individual users to be faced with a half-dozen or more passwords and personal identification numbers (PINs) controlling access to the systems required for them to do their job. The ubiquity of passwords actually relaxes system security since many users tend to use the same password across all applica...
We present BioVXML as an extension of the Voice Extensible Markup Language (VoiceXML). BioVXML is designed for creating modules of biometric verification while maintaining all the features and capabilities of the original VoiceXML. The user verification can now be performed by processing different biometric traits, such as speech or face, and these features gives us an assurance of the user ide...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید