نتایج جستجو برای: mobile biometrics

تعداد نتایج: 178825  

2005
Christos K. Dimitriadis Despina Polemi

This paper proposes a protocol, called BIO3G, for embedding biometrics in 3G security. BIO3G is an enhanced alternative to the common practice of utilizing biometrics locally, for gaining access to the device. BIO3G provides real end-to-end strong user authentication to the mobile operator, requiring no storing or transferring of biometric data and eliminating the need for biometric enrolment a...

Journal: :Computers & Security 2016
Pin Shen Teh Ning Zhang Andrew Beng Jin Teoh Ke Chen

There have been research activities in the area of keystroke dynamics biometrics on physical keyboards (desktop computers or conventional mobile phones) undertaken in the past three decades. However, in terms of touch dynamics biometrics on virtual keyboards (modern touchscreen mobile devices), there has been little published work. Particularly, there is a lack of an extensive survey and evalua...

2011
P. A. Tresadern C. McCool N. Poh P. Matejka A. Hadid C. Levy T. F. Cootes

The Mobile Biometrics (MoBio) project combines real-time face and voice verification for better security of personal data stored on, or accessible from, a mobile platform.

Journal: :Applied sciences 2022

The rapid growth of smartphone financial services raises the need for secure mobile authentication. Continuous authentication is a user-friendly way to strengthen security smartphones by implicitly monitoring user’s identity through sessions. Mobile continuous can be viewed as an anomaly detection problem in which models discriminate between one genuine user and rest impostors (anomalies). In p...

Journal: :Signal, Image and Video Processing 2011

2012
HEATHER ANNE CRAWFORD ANNE CRAWFORD

Mobile devices have consistently advanced in terms of processing power, amount of memory and functionality. With these advances, the ability to store potentially private or sensitive information on them has increased. Traditional methods for securing mobile devices, passwords and PINs, are inadequate given their weaknesses and the bursty use patterns that characterize mobile devices. Passwords ...

2012
Fengling Han Ron G. van Schyndel

Mobile commerce (m-commerce) delivers value-added services to existing customers and creates new market opportunities. However, establishing a secure m-commerce platform that offers high level of service can be challenging. This paper proposes a biometric-based digital identity authentication (BDIA) protocol targeted at m-commerce applications. In the BDIA protocol, m-identity includes both use...

2014
Hillary Fleenor

Mobile devices are rapidly becoming the most popular user end computing and networking device. Mobile devices are often used to access and store personal information. Due to their size and portability, they are a common target for thieves and malicious activity. Unauthorized authentication of mobile devices can result in a great deal of damage to the legitimate owner. However, securing mobile d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید