Sciweavers

335 search results - page 14 / 67
» Biometrics and Security
Sort
View
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
14 years 9 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
CHI
2008
ACM
16 years 3 days ago
Biometric daemons: authentication via electronic pets
A well-known security and identification problem involves the creation of secure but usable identification and authentication tools that the user is fully motivated to adopt. We d...
Pamela Briggs, Patrick L. Olivier
ISSA
2008
15 years 1 months ago
No Age Discrimination for Biometrics
Biometric advances apply to a range of disciplines to ensure the safety and security of individuals and groups. To stress the value of biometrics, this study focuses on the applic...
Marthie Lessing, Lara Weissenberger
ICIAR
2010
Springer
15 years 4 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
15 years 5 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi