Auswahl der wissenschaftlichen Literatur zum Thema „User fingerprint“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "User fingerprint" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "User fingerprint"

1

Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (2021): 458. http://dx.doi.org/10.3390/electronics10040458.

Der volle Inhalt der Quelle
Annotation:
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jiang, Bin, Yikun Zhao, Hongmei Yi, et al. "PIDS: A User-Friendly Plant DNA Fingerprint Database Management System." Genes 11, no. 4 (2020): 373. http://dx.doi.org/10.3390/genes11040373.

Der volle Inhalt der Quelle
Annotation:
The high variability and somatic stability of DNA fingerprints can be used to identify individuals, which is of great value in plant breeding. DNA fingerprint databases are essential and important tools for plant molecular research because they provide powerful technical and information support for crop breeding, variety quality control, variety right protection, and molecular marker-assisted breeding. Building a DNA fingerprint database involves the production of large amounts of heterogeneous data for which storage, analysis, and retrieval are time and resource consuming. To process the larg
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Gabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.

Der volle Inhalt der Quelle
Annotation:
AbstractWeb-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic. It is also used to identify computers that are abusing online advertising and also to prevent credit card fraud. A device fingerprint is created by extracting multiple parameter values from a browser API (e.g. operating system type or browser version). The acquired parameter values are then used to create a hash using the hash function. The disadvantage of using this method is too high susceptibility to small, normally occurring changes (e.g. when changing the browse
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.

Der volle Inhalt der Quelle
Annotation:
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Agarwal, Rohit, A. S. Jalal, and K. V. Arya. "A review on presentation attack detection system for fake fingerprint." Modern Physics Letters B 34, no. 05 (2020): 2030001. http://dx.doi.org/10.1142/s021798492030001x.

Der volle Inhalt der Quelle
Annotation:
Fingerprint recognition systems are susceptible to artificial spoof fingerprint attacks, like molds manufactured from polymer, gelatin or Play-Doh. Presentation attack is an open issue for fingerprint recognition systems. In a presentation attack, synthetic fingerprint which is reproduced from a real user is submitted for authentication. Different sensors are used to capture the live and fake fingerprint images. A liveness detection system has been designed to defeat different classes of spoof attacks by differentiating the features of live and fake fingerprint images. In the past few years, m
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Diaz Pineda, Mabel Rocio, Maria Alejandra Dueñas, and Karen Dayanna Acevedo. "Fingerprints detection using neural networks suitable to physical changes of fingerprint." Revista CINTEX 22, no. 2 (2017): 35–50. http://dx.doi.org/10.33131/24222208.271.

Der volle Inhalt der Quelle
Annotation:
This working paper shows the results of finished research, using image processing techniques to improve the fingerprint obtained from a database, where the image is normalized and segmented to get only the section of the image with the fingerprint. Then, the Gabor filter is applied, and it corrects defects in ridges and valleys, allowing continuity. That way, if the fingerprint has a physical defect, the filter can correct it as long as the segment orientation to be correct. Once improved, the fingerprint, it is binarized and thinned for minutiae extraction. The false minutiae are filtered and
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Alakhras, Marwan, Mousa Hussein, and Mourad Oussalah. "Location Fixing and Fingerprint Matching Fingerprint Map Construction for Indoor Localization." Journal of Sensors 2020 (January 17, 2020): 1–14. http://dx.doi.org/10.1155/2020/7801752.

Der volle Inhalt der Quelle
Annotation:
Building the fingerprint map for indoor localization problems is a labour-intensive and time-consuming process. However, due to its direct influence on the location estimation accuracy, finding a proper mechanism to construct the fingerprint map is essential to enhance the position estimation accuracy. Therefore, in this work, we present a fingerprint map construction technique based on location fix determination and fingerprint matching motivated by the availability of advanced sensing capabilities in smartphones to reduce the time and labour cost required for the site survey. The proposed Lo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sanchez-Reillo, R., L. Mengibar-Pozo, and C. Sanchez-Avila. "Microprocessor smart cards with fingerprint user authentication." IEEE Aerospace and Electronic Systems Magazine 18, no. 3 (2003): 22–24. http://dx.doi.org/10.1109/maes.2003.1193715.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Cahyaningtiyas, Rizqia, Efy Yosrita, and Rakhmat Arianto. "THE AUTOMATIC DOORS INTEGRATED ABSENCE AND USER ACCESS USING FINGERPRINT." Jurnal Ilmiah FIFO 8, no. 2 (2016): 147. http://dx.doi.org/10.22441/fifo.v8i2.1309.

Der volle Inhalt der Quelle
Annotation:
This research aims to design Accompanied Door Access System Automation Absence and User Access Rights Using Integrated Fingerprint Database on Basic Computer Lab Informatics STT-PLN. What is meant by "Absent Automation and User Access Rights" among other computerized attendance automatically using fingerprint and right into a room on a predetermined schedule of lectures on computer lab space. System design method used is the method of evolutionary prototype, using MySQL database and coding using Visual C # .NET. These results indicate that the Door Access System Automation Accompanied Absence
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Stanton, Brian, Mary Theofanos, Shahram Orandi, Ross Micheals, and Nien-Fan Zhang. "Effects of Scanner Height on Fingerprint Capture." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 10 (2007): 592–96. http://dx.doi.org/10.1177/154193120705101005.

Der volle Inhalt der Quelle
Annotation:
Although the deployment of biometric technologies such as fingerprints is becoming more widespread, little attention is being paid to the human-computer interaction that such technologies involve. Most biometric systems employ both hardware and software measures to maximize the capture quality of the biometric data. The physical presentation of the biometric data by the participant to the system involves many anthropometric and ergonomic factors that have been largely ignored. This study examined the effect of the height of the sensor on the quality and the time required to collect fingerprint
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "User fingerprint"

1

Vondráček, Tomáš. "Získávání informací o uživatelích na webových stránkách." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445554.

Der volle Inhalt der Quelle
Annotation:
The aim of the diploma thesis is to map the information provided by web browsers, which can be used in practice to identify users on websites. The work focuses on obtaining and subsequent analysis of information about devices, browsers and side effects caused by web extensions that mask the identity of users. The acquisition of information is realized by a designed and implemented library in the TypeScript language, which was deployed on 4 commercial websites. The analysis of the obtained information is carried out after a month of operation of the library and focuses on the degree of informat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Al-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Der volle Inhalt der Quelle
Annotation:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used f
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Al-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Der volle Inhalt der Quelle
Annotation:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used f
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Jurek, Jakub. "Biometrické rozpoznání živosti prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242191.

Der volle Inhalt der Quelle
Annotation:
This project deals with general biometrics issues focusing on fingerprint biometrics, with description of dermal papillae and principles of fingerprint sensors. Next this work deals with fingerprint liveness detection issues, including description of methods of detection. Next this work describes chosen features for own detection, used database of fingerprints and own algorithm for image pre-processing. Furthermore neural network classifier for liveness detection with chosen features is decribed followed by statistic evaluation of the chosen features and detection results as well as descriptio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ismail, Mahado. "Investigation into the significance of monitoring drug use from a fingerprint." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/849734/.

Der volle Inhalt der Quelle
Annotation:
The use of chemical analysis of fingerprints as an alternative approach for drug testing has become subject of recent publications. However, the significance of the detection of drugs in fingerprints compared to a background population of non-drug users has not yet been explored. In this research, the main area of research was to determine the forensic potential of detecting cocaine and heroin use through the analysis of fingerprints. Fingerprint samples deposited on paper were extracted using an extraction solution (10% dichloromethane in methanol) and analysed using liquid chromatography - m
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Adelantado, Sánchez Carlos. "Use of aspartic acid racemization in fingerprints as a molecular clock." Master's thesis, Instituto Superior de Ciências da Saúde Egas Moniz, 2014. http://hdl.handle.net/10400.26/6716.

Der volle Inhalt der Quelle
Annotation:
Dissertação de Erasmus Mundus para obtenção do grau de mestre em Técnicas Laboratoriais Forenses<br>Aspartic acid is the chemical, amongst amino acids, whose racemization process is considered to be the fastest and the most reliable way to conduct an ageing study in some living-being tissues. Racemization is a natural-occurring event in which L-stereoisomer of aspartic acid is converted into D-stereoisomer in an equilibrium dependent on factors namely pH, environmental conditions and, most critically, on temperature.<br>The main objective of the current study is to assess the influence of temp
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Wang, Sean. "Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108186.

Der volle Inhalt der Quelle
Annotation:
<p> Data deduplication is introduced as a popular technique used to increase storage efficiency used in various data centers and corporate backup environments. There are various caching techniques and metadata checking available to prevent excessive file scanning. Due to the nature of content addressable chunking algorithm being a serial operation, the data deduplication chunking process often times become the performance bottleneck. This project introduces a parallelized Rabin fingerprint algorithm suitable for GPU hardware architecture that aims to optimize the performance of the deduplicati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Swift, Benjamin. "The use of radio-isotopes in forensic science : the development of the isotope fingerprint analysis." Thesis, University of Leicester, 2004. http://hdl.handle.net/2381/29475.

Der volle Inhalt der Quelle
Annotation:
It is generally accepted that remains should be no more than 75 years old to warrant police interest. Therefore any reliable dating method should distinguish bones from within this interval accurately from those lying outside of it. Although archaeologists have reliable tools for dating material, pathologists have been unable to devise a method that caters for their specific needs. Previous work has focused upon the physiochemical properties of bone or its organic constituents, though the results have failed to produce a workable calibration system. The first hypothesis of this thesis has conf
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Der volle Inhalt der Quelle
Annotation:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication me
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Derakhshani, Reza. "Determination of vitality from a non-invasive biomedical measurement for use in integrated biometric devices." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=1035.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.)--West Virginia University, 1999.<br>Title from document title page. Document formatted into pages; contains x, 126 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. [72]-75).
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "User fingerprint"

1

Fingerprint detection with lasers. 2nd ed. M. Dekker, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zofka, Adam, Maria Chrysochoou, Iliya Yut, et al. Evaluating Applications of Field Spectroscopy Devices to Fingerprint Commonly Used Construction Materials. Transportation Research Board, 2013. http://dx.doi.org/10.17226/22770.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Menzel, E. Roland. An introduction to lasers, forensic lights, and fluorescent fingerprint detection techniques. Lightning Powder Co., 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Chrysochoou, Maria, Chad Johnston, and Iliya Yut. Evaluating Applications of Field Spectroscopy Devices to Fingerprint Commonly Used Construction Materials (Phase IVâ€"Implementation). Transportation Research Board, 2014. http://dx.doi.org/10.17226/22308.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

International Forensic Symposium on Latent Prints (1987 Quantico, Va.). Proceedings of the International Forensic Symposium on Latent Prints. Laboratory Division, Federal Bureau of Investigation, United States Dept. of Justice, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kötzing, TCM-Klinik Bad, and University Hospital at Beijing University of Chinese Medicine, eds. Chromatographic fingerprint analysis of herbal medicines: Thin-layer and high performance liquid chromatography of Chinese drugs. 2nd ed. Springer, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Science of Fingerprints: Classification and Uses. Diane Books Publishing Company, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

United States. Federal Bureau of Investigation., ed. The Science of fingerprints: Classification and uses. U.S. Dept. of Justice, Federal Bureau of Investigation, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Center, National Crime Information, ed. The Science of fingerprints: Classification and uses. 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

The Science of Fingerprints: Classification and Uses. US Government Printing Office, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "User fingerprint"

1

Khokher, Rohit, and Ram Chandra Singh. "A Graphical User Interface-Based Fingerprint Recognition." In Mathematical Modelling, Optimization, Analytic and Numerical Solutions. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0928-5_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gil, Younhee, Dosung Ahn, Choonwoo Ryu, Sungbum Pan, and Yongwha Chung. "User Enrollment Using Multiple Snapshots of Fingerprint." In Neural Information Processing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30499-9_52.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kwan, Paul W. H., Junbin Gao, and Graham Leedham. "A User-Centered Framework for Adaptive Fingerprint Identification." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01393-5_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dhaked, Devender, Surendra Yadav, Manish Mathuria, and Saroj Agrawal. "User Identification Over Digital Social Network Using Fingerprint Authentication." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2285-3_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Yoon, Eun-Jun, and Kee-Young Yoo. "Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11600930_40.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jiang, Xiang, Shikui Wei, Ruizhen Zhao, Ruoyu Liu, Yufeng Zhao, and Yao Zhao. "A Visual Perspective for User Identification Based on Camera Fingerprint." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34110-7_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Corsetti, Barbara, Raul Sanchez-Reillo, and Richard M. Guest. "Ergonomics in Mobile Fingerprint Recognition Systems: A User Interaction Evaluation." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51369-6_51.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Firdaus, Noor Azurati Ahmad, and Shamsul Sahibuddin. "Adapted WLAN Fingerprint Indoor Positioning System (IPS) Based on User Orientations." In Recent Trends in Information and Communication Technology. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59427-9_25.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lee, Youngkwon, and Taekyoung Kwon. "An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards." In Computational Science and Its Applications - ICCSA 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751588_95.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Riley, Chris, Graham Johnson, Heather McCracken, and Ahmed Al-Saffar. "Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems." In Human-Computer Interaction – INTERACT 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03658-3_35.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "User fingerprint"

1

Wenzl, Matthias, and Daniel Kluka. "Adding Channel Security to a Fingerprint Verification Chain." In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67356.

Der volle Inhalt der Quelle
Annotation:
Authenticating persons using fingerprints is a widely accepted method in the field of access control, border control, prosecution and many others. Today, fingerprint modules with customizable firmware can be bought commercially off the shelf by hobbyists and small companies to be used in their applications and are usually locally separated from a controller implementing the feature extraction and comparison algorithms. As a matter of fact, the communication channel between the sensor and the controller module is susceptible to eavesdropping and man in the middle attacks. Nevertheless, adding c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sugiura, Atsushi, and Yoshiyuki Koseki. "A user interface using fingerprint recognition." In the 11th annual ACM symposium. ACM Press, 1998. http://dx.doi.org/10.1145/288392.288575.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pooja, S., and R. Saritha. "Enhanced fingerprint system with user password." In 2016 International Conference on Circuits, Controls, Communications and Computing (I4C). IEEE, 2016. http://dx.doi.org/10.1109/cimca.2016.8053281.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Abouollo, Ahmed, and Sultan Almuhammadi. "Detecting malicious user accounts using Canvas Fingerprint." In 2017 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017. http://dx.doi.org/10.1109/iacs.2017.7921998.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Blanco-Gonzalo, Ramon, Raul Sanchez-Reillo, Rodrigo Ros-Gomez, and Belen Fernandez-Saavedra. "User acceptance of planar semiconductor fingerprint sensors." In 2015 International Carnahan Conference on Security Technology (ICCST). IEEE, 2015. http://dx.doi.org/10.1109/ccst.2015.7389653.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sebgui, Marouane, Sliman Bah, Abdelaziz Berrado, and Belhaj El Graini. "Enhancing primary user detection through radio frequency fingerprint." In 2014 Fifth International Conference on Next Generation Networks and Services (NGNS). IEEE, 2014. http://dx.doi.org/10.1109/ngns.2014.6990246.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Gupta, P., S. Ravi, A. Raghunathan, and N. K. Jha. "Efficient fingerprint-based user authentication for embedded systems." In 2005 42nd Design Automation Conference. IEEE, 2005. http://dx.doi.org/10.1109/dac.2005.193809.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Gupta, Pallav, Srivaths Ravi, Anand Raghunathan, and Niraj K. Jha. "Efficient fingerprint-based user authentication for embedded systems." In the 42nd annual conference. ACM Press, 2005. http://dx.doi.org/10.1145/1065579.1065643.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Xu, Jing, Wen-Tao Zhu, and Deng-Guo Feng. "Improvement of a Fingerprint-Based Remote User Authentication Scheme." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.62.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Bae, Geuntae, Hojae Lee, Sunghoon Son, Doha Hwang, and Jongseok Kim. "Secure and robust user authentication using partial fingerprint matching." In 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2018. http://dx.doi.org/10.1109/icce.2018.8326078.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "User fingerprint"

1

Whitus, B. R., J. S. Goddard, W. B. Jatko, W. W. Manges, and D. A. Treece. Low-Speed Fingerprint Image Capture System User`s Guide, June 1, 1993. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/10179252.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Stanton, Brian, Mary Theofanos, and Charles Sheppard. A study of users with visual disabilities and a fingerprint process. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7484.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Carasso, Alfred S. The Use of ‘Slow Motion’ Levy Stable Fractional Diffusion Smoothing In Alternative Methods of Latent Fingerprint Enhancement. National Institute of Standards and Technology, 2013. http://dx.doi.org/10.6028/nist.ir.7932.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Nic Daeid, Niamh, Heather Doran, Lucina Hackman, and Pauline Mack. The Curse of the Burial Dagger Teacher Materials. University of Dundee, 2021. http://dx.doi.org/10.20933/100001220.

Der volle Inhalt der Quelle
Annotation:
The Curse of the Burial Dagger is an interactive graphic novel murder mystery, created by the Leverhulme Research Centre for Forensic Science and digital story studio Fast Familiar. Players use maths, logic and critical reasoning skills to assist Susie uncover different types of forensic evidence and weigh up contrasting hypotheses. Can they uncover the events leading up to Lord Hamilton’s death and deduce how he died…before the curse strikes again? These documents are the Teacher/Group lead pack which contain additional resources including: • The Teacher/Group Lead Pack – Teacher walk through
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Singhvi, Punit, Javier García Mainieri, Hasan Ozer, and Brajendra Sharma. Rheology-Chemical Based Procedure to Evaluate Additives/Modifiers Used in Asphalt Binders for Performance Enhancements: Phase 2. Illinois Center for Transportation, 2021. http://dx.doi.org/10.36501/0197-9191/21-020.

Der volle Inhalt der Quelle
Annotation:
The increased use of softer binders in Illinois over the past decade is primarily attributed to the increased use of recycled materials in asphalt pavement construction. The shift in demand of using PG 58-28 over PG 64-22 has resulted in potential alternative methods to produce softer binders more economically using proprietary products. However, there are challenges in using these proprietary products for asphalt modification because of uncertainty in their long-term performance and significant variability in binder chemistry. The current SuperPave performance grading specification for asphal
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!