Iris authentication in handheld devices - considerations for constraint-free acquisition
نویسندگان
چکیده
منابع مشابه
User Authentication Schemes for Mobile and Handheld Devices
User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Per...
متن کاملLearning object design considerations for small-screen handheld devices
The key limitation of handheld technology for the delivery of learning objects is the small screen that is available for effective display. The smallness of the screen not only adversely affects the clarity, but it also negatively impacts on the acceptance and integration of this potentially useful technology in education. Handheld devices are likely to change further in size in the future with...
متن کاملWanted: Programmers for Handheld Devices
T he pace of change in computer technology can be breathtaking. Frequently, this makes it difficult for programmers to maintain skills that are in demand. Nowhere is this more apparent than in one of the newest and most dynamic segments of the computer industry: hand-held devices and wireless technology. The use of handheld devices is growing rapidly, as is the demand for applications that run ...
متن کاملSecuring handheld devices
Handheld devices are becoming an indispensable part of everyday life. In this paper, we review the security of handheld devices, which are based on the Pocket PC operating system. We then identify the risks and threats of having these handheld devices connected to the Internet, and propose several methods to protect against the threats. We point out some advantages and security threats of porti...
متن کاملSecurity Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Consumer Electronics
سال: 2015
ISSN: 0098-3063
DOI: 10.1109/tce.2015.7150600