Prior research has discussed and investigated how global teams bridge multiple boundaries (e.g., distance, time, culture) that separate its members and impact the coordination of ...
User interfaces (Uis) for client-server-and Web-based products and services must enable users around the world to access complex data and functions. Solutions to successful user-i...
Aaron Marcus, Karl Wieser, John Armitage, Volker F...
Fusion of multiple face and fingerprint matchers based on different biometrics for personal authentication has been investigated in the last years. However, the performance achiev...
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Abstract. In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris ...
Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Ferna...