Veins based Authentication System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Veins based Authentication System

Biometric system such as finger, face, iris, ear, voice, DNA etc. is used for personal identification. Authentication based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin on back of the hand. Vein pattern are unique and also difficult to duplicate. In this paper, we present an approach to identify the user using hand vein pattern and knuckl...

متن کامل

Zero-Stop Authentication: Sensor-Based Real-Time Authentication System

This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing s...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Fingerprint Based Biometric ATM Authentication System

Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In t...

متن کامل

Secure Comparator: a ZKP-Based Authentication System

Being a secret, it’s best protected when it never leaves the safe zone. Proving identity involves communicating the secret to another party, which eventually exposes the whole or a part of the secret, in a direct or indirect (hashed) form. In the real world, authentication traffic passes thousands of systems between a prover (you) and a verifier (an entity which eventually decides whether your ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2015

ISSN: 0975-8887

DOI: 10.5120/21346-4360