نتایج جستجو برای: mobile biometrics

تعداد نتایج: 178825  

2010
Shkodran Gerguri Václav Matyás Zdenek Ríha Ludek Smolík

Current research often focuses on the design of new methods that extend the well-established role of biometrics in authentication and identification into key management and cryptography. Methods have been proposed that involve biometric-governed access to cryptographic keys, as well as methods that utilize biometric samples to derive keys for specialized encryption algorithms. The aim of this p...

Journal: :Electronics 2021

Authentication and privacy play an important role in the present electronic world. Biometrics especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store attributes of minutia point a fingerprint directly database as user template. Existing research works have shown that from such insecure templates, original fin...

2011
Alok Kumar Vishwakarma Atul Kumar

The significant improvement in the information and communication Technology (ICT) from last few decades increases various new needs. E-Governance system has also no exception. People are approaching to fulfill their dreams. In the case of M-voting the security is the major issue. Democracy Needs all and only the authorized voters can vote and each eligible voter can vote but not more than once....

2016
Gang Wang

The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...

2003
Jane You David Zhang Jiannong Cao Minyi Guo

This paper presents an efficient and effective approach to personal identification by parallel biometrics computing using mobile agents. To overcome the limitations of the existing password-based authentication services on the Internet, we integrate multiple personal features including fingerprints, palmprints, hand geometry and face into a hierarchical structure for fast and reliable personal ...

Journal: :IJGBL 2012
Tracey J. Mehigan Ian J. Pitt

Adaptive learning systems tailor content delivery to meet specific needs of the individual for improved learning-outcomes. Learning-styles and personalities are usually determined through the completion of questionnaires. There are a number of models available for this purpose including the Myer-Briggs Model (MBTI), the Big Five Model, and the Felder Silverman Learning-Style Model (FSLSM). Most...

2012
Yuan-Yi Fan René Weber

Different from computer vision based approaches in audience participation research, such as in Glimmer [1] and in Flock [2], this paper presents a mobile approach to collecting and visualizing bodily responses from audience members. A mobile biometric application is designed as a novel medium that interfaces audience members to experienced content. To realize our goal on a mobile platform, a co...

2011
Alberto de Santos Sierra Carmen Sánchez Ávila Aitor Mendaza-Ormaza Javier Guerra Casanova

The increasing demand of security oriented to mobile applications has raised the attention to biometrics, as a proper and suitable solution for providing secure environment to mobile devices. With this aim, this document presents a biometric system based on hand geometry oriented to mobile devices, involving a high degree of freedom in terms of illumination, hand rotation and distance to camera...

2015
Gang Wang

The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...

2016
Gang Wang

The explosive growth of user data on the Internet has introduced significant security threats. In recent years, large data breaches and malicious content distribution (spam, malware) become prevalent. With the rapid adoption of mobile and wearable devices, user data now includes a wide range of personal mobile and physical data. It ranges from GPS location traces, to biometrics data, to user in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید