Iris authentication in handheld devices - considerations for constraint-free acquisition

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User Authentication Schemes for Mobile and Handheld Devices

User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Per...

متن کامل

Learning object design considerations for small-screen handheld devices

The key limitation of handheld technology for the delivery of learning objects is the small screen that is available for effective display. The smallness of the screen not only adversely affects the clarity, but it also negatively impacts on the acceptance and integration of this potentially useful technology in education. Handheld devices are likely to change further in size in the future with...

متن کامل

Wanted: Programmers for Handheld Devices

T he pace of change in computer technology can be breathtaking. Frequently, this makes it difficult for programmers to maintain skills that are in demand. Nowhere is this more apparent than in one of the newest and most dynamic segments of the computer industry: hand-held devices and wireless technology. The use of handheld devices is growing rapidly, as is the demand for applications that run ...

متن کامل

Securing handheld devices

Handheld devices are becoming an indispensable part of everyday life. In this paper, we review the security of handheld devices, which are based on the Pocket PC operating system. We then identify the risks and threats of having these handheld devices connected to the Internet, and propose several methods to protect against the threats. We point out some advantages and security threats of porti...

متن کامل

Security Policy Management for Handheld Devices

The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Consumer Electronics

سال: 2015

ISSN: 0098-3063

DOI: 10.1109/tce.2015.7150600