Dissertations / Theses on the topic 'Biometric Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Biometric Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textTitle from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
Fouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.
Full textJayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textBlommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Full textVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Cooper, Curt S. "Aviation security: biometric technology and risk based security aviation passenger screening program." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27811.
Full textSince 9/11, the Transportation Security Administration (TSA) has struggled to maintain a balance between providing a secure world-class aviation passenger-screening program (APSP) while providing efficiency, convenience and security for the traveling public and the airline industry. For years the TSA has applied resources and procedures uniformly to all passengers during aviation passenger screening. It is mainly a one size fits all screening where all passengers are treated as equal risk, which has exponentially increased resources, procedures and equipment required to do aviation passenger screening, Recently, the Transportation Security Administration has sought to find a better way to conduct aviation passenger screening and is transitioning to Risk Based Security (RBS). The RBS initiatives have greatly improved the aviation passenger screening experience while increasing the efficiency of checkpoint screening by shortening the amount of wait times. Furthermore, it has allowed resources to be applied to high-risk individuals and lessen the burden of passenger screening on low-risk individuals. This has freed up resources reduced procedures while simultaneously increasing the efficiency of the checkpoint. The research here provides options on how to better enable current RBS initiatives by incorporating biometric technology into the aviation passenger-screening program. This research has reviewed other government programs that have incorporated biometrics into their procedures to improve the efficiency and reliability by using biometrically enhanced security measures. Through the application or modification of these biometrically enhanced security programs of other agencies, the TSA could standardize and incorporate biometrics into the RBS APSP allowing for authentication of both identity verification and identification. This research will explore how to incorporate biometrics into the current Risk-Based Security Aviation Passenger Screening Program.
Lease, David R. "Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers." Diss., Capella University, 2005. http://hdl.handle.net/10919/71576.
Full textAl-Assam, Hisham. "Entropy evaluation and security measures for reliable single/multi-factor biometric authentication and biometric keys." Thesis, University of Buckingham, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.601453.
Full textSumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.
Full textPh.D.
Department of Criminal Justice and Legal Studies
Health and Public Affairs
Public Affairs PhD
Kuan, Hung-i. "Evaluation of a biometric keystroke typing dynamics computer security system." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/26530.
Full textThis study evaluates an inexpensive personal computer access control system that relies on biometric keystroke typing dynamics technology, BioPassword Model 2100 (BioPassword). Enrollment time, verification time, false rejection error rate, false acceptance error rate, and user acceptance were evaluated for this system. The results show that BioPassword provides multilayer security through the inclusion of privilege control, audit functions, passwords, and verification of a personal behavioral characteristic, the rate and variation of typing a given password string. Enrollment and verification times were considered satisfactorily fast. Overall false rejection error rate was 22.5%, while false acceptance error rate was 3.4%. The false rejection error rate for acceptance as a function of trial number from one trial to five trials were 4. 4%, 1.4%, O.7%, O.4%, andO.3% respectively. These values were achieved under relatively uncontrolled conditions and should be improved on by using recommendations that are included. Users generally reported satisfaction with the system, which should be acceptable as part of an office automation system when used in conjunction with other standard security measures. BioPassword Model 21 00, Biometric technology, Keystroke Typing Dynamics, False Rejection Error Rate, False Acceptance Error Rate, Enrollment Time, Verification Time
Al-Karawi, K. A. "Robust speaker recognition in reverberant condition : toward greater biometric security." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/47139/.
Full textMai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Full textAbbadi, Laith. "Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23413.
Full textBreedt, Morne. "Integrating biometric authentication into multiple applications." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/27605.
Full textDissertation (MSc (Computer Engineering))--University of Pretoria, 2007.
Electrical, Electronic and Computer Engineering
MSc
unrestricted
Mahadevan, Karthikeyan. "Estimating reliability impact of biometric devices in large scale applications." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3096.
Full textTitle from document title page. Document formatted into pages; contains vii, 66 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 62-64).
Huang, Xuan. "Mobile security and smart systems : multi-modal biometric authentication on mobile devices." Thesis, Abertay University, 2013. https://rke.abertay.ac.uk/en/studentTheses/ce2dec7b-fdcf-496e-81c4-fb98d0033c78.
Full textIqbal, K. "Image detection and retrieval for biometric security from an image enhancement perspective." Thesis, Coventry University, 2011. http://curve.coventry.ac.uk/open/items/ed5b98d3-84e6-4070-89cb-7ede2f0e9c0b/1.
Full textDabbah, Mohammad A. "Non-reversible mathematical transforms for secure biometric face recognition." Thesis, University of Newcastle upon Tyne, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.548002.
Full textMohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems." [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.
Full textBitonti, Ann Marie. "Assessing the relationship between demographic attributes with the acceptance of biometric security devices." Thesis, Capella University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3634666.
Full textThe problem addressed was the losses incurred by organizations and individuals that resulted from computer and/or network security incidents originating from within or outside an organization. Although research has shown biometrics to be a reliable mechanism in the protection of data through authorization access, critics in opposition of biometric use profess that increased personal and financial security increases the loss of individual privacy. The acceptance and adoption of biometric based security devices has created a dichotomy between those individuals that demand increased security measures with those that fear the collection of personal data could cause them personal harm. This study extends the technology acceptance model (TAM) to include the demographic variables age, gender, and geographic residence to investigate if individual differences determine if a relationship exists between those characteristics and their perceived need for personal security and individual privacy. Previous research has shown that an individual with a strong need for security and privacy is more willing to adopt biometric technology in the protection of their personal data or self. The knowledge gained from this study addresses the challenges for a successful deployment of biometrics in the prevention of unauthorized access and the future marketing of security devices. The results from the study indicated that there is a relationship between an individual's age and their perceived need of security and perceived need for privacy. The addition of different demographic variables is recommended for future research. The addition of the demographic attributes as extended variables to TAM provides acumen in the study of end-user adoption of biometric technology and its diffusion into the marketplace.
Matthew, Peter. "Novel approaches to biometric security with an emphasis on liveness and coercion detection." Thesis, Edge Hill University, 2016. http://repository.edgehill.ac.uk/7129/.
Full textEyers, Brandy Marie. "An Analysis of Remote Biometric Authentication with Windows." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/3096.
Full textKarlsson, Anna. "Device Sensor Fingerprinting : Mobile Device Sensor Fingerprinting With A Biometric Approach." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119341.
Full textArakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.
Full textAl-Noori, A. H. Y. "Robust speaker recognition in presence of non-trivial environmental noise (toward greater biometric security)." Thesis, University of Salford, 2017. http://usir.salford.ac.uk/44604/.
Full textBořutík, Stanislav. "Bezpečnost technologie RFID." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-235458.
Full textAl, Abdulwahid Abdulwahid Abdullah. "Federated authentication using the Cloud (Cloud Aura)." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9596.
Full textBrobeck, Stefan, and Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.
Full textBiometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.
The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.
There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.
We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.
Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.
Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.
Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.
Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.
Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.
Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.
Bin, Mohd Isa Mohd Rizal. "Watermarked face recognition scheme : enhancing the security while maintaining the effectiveness of biometric authentication systems." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/watermarked-face-recognition-scheme(a242609e-ba02-4cca-bfae-3615793fd018).html.
Full textFeng, Yicheng. "Discriminability and security of binary template in face recognition systems." HKBU Institutional Repository, 2012. https://repository.hkbu.edu.hk/etd_ra/1455.
Full textJanahi, Yusuf M. A. M. "Factors affecting the adoption of Internet banking in the Kingdom of Bahrain." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15884.
Full textZhou, Xuebing Verfasser], Dieter W. [Akademischer Betreuer] [Fellner, and Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1111908354/34.
Full textZhou, Xuebing [Verfasser], Dieter W. [Akademischer Betreuer] Fellner, and Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-28858.
Full textGiesing, Ilse. "User perception related to identification through biometrics within electronic business." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.
Full textBanerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Full textPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Abraham, Arya. "It is I: An Authentication System for a Reconfigurable Radio." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34353.
Full textMaster of Science
Norris-Jones, Lynne. "Demonstrate and document : the development of a best practice model for biometric access control management." Thesis, Cardiff Metropolitan University, 2011. http://hdl.handle.net/10369/6411.
Full textPonce, Arturo. "A Dynamic Behavioral Biometric Approach to Authenticate Users Employing Their Fingers to Interact with Touchscreen Devices." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/46.
Full textLouw, Lloyd A. B. "Automated face detection and recognition for a login system." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/438.
Full textFeng, Yicheng. "Template protecting algorithms for face recognition system." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/832.
Full textÖberg, Fredrik. "Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42294.
Full textMerlano, Shari. "Privacy Concerns Regarding the Use of Biometrics in Trusted Traveler Programs." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3183.
Full textNavrátil, Petr. "Podpora výuky biometrických přístupových systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217304.
Full textKetab, Salam. "E-invigilation of e-assessments." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/10144.
Full textHedberg, David. "Autentisiering av användare i datoriserade miljöer hos SMF - biometri kontra tokens : En jämförelse av två sätt att implementera autentisering av användare." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18816.
Full textAs technology evolves, corporations and enterprises are forced to evolve alongside it. Storing company information and data on servers and computers have become common practice.Initially, the goal with the work presented was to compare biometric authentication and token authentication in relation so SMEs. In the current landscape there is no comprehensive study in these two methods of authentication in relation to SMEs. A framework was developed for system administrators to use when choosing one of these methods of authentication. The framework is a summarization of the works analytical part.A literature study was conducted to reach the goal. Three databases were used as sources of information. These three were namely IEEEXplore, ACM Digital Library, and ScienceDirect. From these sources, literature was identified on which the study was then based. Thematic coding was used to analyze the collected data.After the process of collecting and including/excluding was complete, a total of 28 articles remained. From these articles a total of 10 themes were identified from the thematic coding. These themes were cost, integrity, usability, security pros, security cons, two-factor authentication, scalability, biometric types, token types, and future biometric technology. Four of these were more prevalent, namely cost, integrity, usability, and security.After the analysis was finished the themes that emerged as important were integrity and usability. Because of this, the framework is heavily influenced by these themes and they are particularly important for system administrators to consider.
Larico, Chavez Roger Fredy. "Uma proposta para melhoria na efluencia de um sistema de reconhecimento de Iris Humana." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260071.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-09T15:45:35Z (GMT). No. of bitstreams: 1 LaricoChavez_RogerFredy_M.pdf: 5399459 bytes, checksum: 98e285b0ab78aa02b5bde3944dc7d9d6 (MD5) Previous issue date: 2007
Resumo: A biometria tem sido utilizada amplamente em segurança de sistemas automatizados. Neste trabalho propõe-se um sistema de reconhecimento pessoal baseado na biometria de íris. Essa escolha baseia-se no fato de que a íris fornece uma das melhores formas de biometria, atualmente. Tem-se como objetivo, estudar e melhorar os métodos existentes visando uma diminuição no tempo de processamento, na quantidade de memória requerida bem como na porcentagem de erros. A pesquisa mostra que o bloco mais lento corresponde ao da localização. O bloco que insere mais erros no processo de reconhecimento é o da captura de dados, isso porque a coleta de informações é feita por um dispositivo (câmera) em um ambiente onde muitos fatores transformam-se em fontes de erros. Os algoritmos de reconhecimento estudados visam uma percentagem de erro mínimo. Para o desenvolvimento de um algoritmo rápido visando o reconhecimento de íris, é necessária uma localização adequada da imagem, com pouca perda de informação. Neste trabalho, também se apresenta um algoritmo detalhado de localização rápida da textura da íris. Para isso, se utiliza um esquema de busca iterativa de centros e raios de círculos concêntricos bem como a aplicação de ruído gaussiano e a utilização de filtros medianos para se conseguir uma resposta confiável. Os resultados encontrados são comparados com algoritmos publicados na literatura e exaustivamente testados. O algoritmo proposto apresenta desempenho superior em comparação com outros em relação à velocidade de processamento assim como um incremento na exatidão de reconhecimento
Abstract: The biometric has been widely used in automated security systems. In this work we propose a biometrics personal identification system based on iris, due to its better biometrics parameters results. The purpose of this study is to improve existing methods aiming to decrease the processing time, the required storage memory and the error rate. Our research shows that the slowest operation is the segmentation of iris. Also, the block that adds more errors in the recognition process is the data capture, due to the fact it is made by a device (camera) in such environment that many factors can become source of errors. The studied recognition algorithms search for a minimum error percentage. In order to develop a fast algorithm for iris recognition we need a fine segmentation image, with a low loss of information. In this work, we also present a detailed algorithm for the fast segmentation of iris texture that was achieved using an iterative search for centers and radius of concentric circles, as well as the application of Gaussian noise and the utilization of median filters to get reliable results. The achieved results are evaluated and compared to the published algorithms. The algorithm presents a better performance with relation to processing speed as well as an improvement of the recognition precision
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
Mehdi, Ali. "Developing a Computer System for the Generation of Unique Wrinkle Maps for Human Faces. Generating 2D Wrinkle Maps using Various Image Processing Techniques and the Design of 3D Facial Ageing System using 3D Modelling Tools." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5144.
Full textFirc, Anton. "Použitelnost Deepfakes v oblasti kybernetické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445534.
Full textFiorese, Mauricio. "Uma Proposta de autenticação de usuários para ensino a distância." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2000. http://hdl.handle.net/10183/80127.
Full textThis work investigates different strategies and techniques of user authentication in order to determine which ones may be integrated in a distance learning environment. Several authentication solutions available on the market are analyzed in order to find the most appropriate. The criteria used to determine the best solutions involve cost or amount of equipments involved, operational simplicity, and degree of confidence or results obtained. Based on this analysis, an authentication model that integrates several authentication techniques is delineated in order to obtain greater security than those used in most distance learning systems, based only on passwords. This system works like a proxy whose function is to control access to Web pages through the combination of passwords, random queries, biometric devices and random checks, at the same time that it generates logs of student's activity during a course. These logs contain information about day and hour of access, time spent on each page, IP address of the student's machine and so on. This information can be used both to evaluate the student and to generate his/her statistical profile. This profile is used to give an alarm when the data of the profile undergo changes above the established limits, during the student's activity. A prototype of the system has been implemented to validate the solution designed. The integration of the authentication methods, which identifies both the student and the machine where he/she is working, with the evaluation routines of the distance learning procedure, is one of the main reached results.
Al-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Full textAl-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Full text