66   Artículos

 
en línea
Maria Louro da Silva, Carolina Gouveia, Daniel Filipe Albuquerque and Hugo Plácido da Silva    
Bio-Radar (BR) systems have shown great promise for biometric applications. Conventional methods can be forged, or fooled. Even alternative methods intrinsic to the user, such as the Electrocardiogram (ECG), present drawbacks as they require contact with... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yi Zhao and Song-Kyoo Kim    
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed    
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Allam Jaya Prakash, Kiran Kumar Patro, Saunak Samantray, Pawel Plawiak and Mohamed Hammad    
An electrocardiogram (ECG) is a unique representation of a person?s identity, similar to fingerprints, and its rhythm and shape are completely different from person to person. Cloning and tampering with ECG-based biometric systems are very difficult. So,... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yajie Wang, Xiaomei Zhang and Haomin Hu    
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ioanna Anastasaki, George Drosatos, George Pavlidis and Konstantinos Rantos    
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Smita Khairnar, Shilpa Gite, Ketan Kotecha and Sudeep D. Thepade    
Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of the most promising biometrics techniques, it is vulnerable to spoofing threats. Many researchers focus on face liveness detection to pr... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yanmin Lei, Dong Pan, Zhibin Feng and Junru Qian    
With the development of deep learning technology, more and more researchers are interested in ear recognition. Human ear recognition is a biometric identification technology based on human ear feature information and it is often used for authentication a... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »