Dissertations / Theses on the topic 'Personal Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 23 dissertations / theses for your research on the topic 'Personal Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wong, Chin Man. "Personal identification/authentication by using hand geometry /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WONG.
Full textIncludes bibliographical references (leaves 104-109). Also available in electronic version. Access restricted to campus users.
Nosseir, Ann. "Towards authentication via selected extraction from electronic personal history." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501883.
Full textEnany, Ahmed. "Achieving Security in Messaging and Personal Content in Symbian Phones." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5635.
Full textPhone: +46735731360
Mahboubi, Arash. "Security of critical information infrastructures exposed to mobile personal devices." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/118743/1/Arash_Mahboubi_Thesis.pdf.
Full textMendoza, Patricia A. "An enhanced method for the existing bluetooth pairing protocol to avoid impersonation attacks." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textUllah, Abrar. "Security and usability of authentication by challenge questions in online examination." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/18186.
Full textBatie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.
Full textMarnell, Joseph. "An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access Environments." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/970.
Full textPutz, Daniel Robert. "Spam on the phone - VoIP and its biggest weakness : Studies about the users’ willingness to offer personal information in order to avoid VoIP spam." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1393.
Full textIt is very probable that VoIP will soon replace the ordinary telephone. Beside all advantages of the digital voice-connection it is linked to the danger of spam on the telephone. A lot of approaches have been developed to solve the problem of VoIP spam. Because some of these solutions are based on access to personal information of its users, a broad discussion about the best and most ethical approach has started.
This thesis analyzes the users’ point of view towards the VoIP spam problem and the extent of users’ willingness to offer private information in order to avoid VoIP spam. It presents results from a qualitative and a quantitative research as well as approaches for a most realistic- and most promising VoIP solution. These new approaches are based on the results of the research.
The main points of the results showed that users were not willing to offer private information to companies and that they were not willing to pay any amount of money for VoIP spam solutions. Users held governmental organisations and telephone operators responsible for finding a solution against VoIP spam.
Au, Wai Ki Richard. "Agent-based one-shot authorisation scheme in a commercial extranet environment." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16708/1/Wai_Ki_Au_Thesis.pdf.
Full textAu, Wai Ki Richard. "Agent-based one-shot authorisation scheme in a commercial extranet environment." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16708/.
Full text"Mobile personal authentication using fingerprint." 2004. http://library.cuhk.edu.hk/record=b5896205.
Full textThesis submitted in: July 2003.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 64-67).
Abstracts in English and Chinese.
List of Figures --- p.i
List of Tables --- p.iii
Acknowledgments --- p.iv
摘要 --- p.v
Thesis Abstract --- p.vi
Chapter 1. --- Mobile Commerce --- p.1
Chapter 1.1 --- Introduction to Mobile Commerce --- p.1
Chapter 1.2 --- Mobile commence payment systems --- p.2
Chapter 1.3 --- Security in mobile commerce --- p.5
Chapter 2. --- Mobile authentication using Fingerprint --- p.10
Chapter 2.1 --- Authentication basics --- p.10
Chapter 2.2 --- Fingerprint basics --- p.12
Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15
Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19
Chapter 3.1 --- Objectives --- p.19
Chapter 3.2 --- Hardware and software design --- p.21
Chapter 3.2.1 --- Choice of hardware platform --- p.21
Chapter 3.3 --- Experiments --- p.25
Chapter 3.3.1 --- Design methodology I - DSP --- p.25
Chapter 3.3.1.1 --- Hardware platform --- p.25
Chapter 3.3.1.2 --- Software platform --- p.26
Chapter 3.3.1.3 --- Implementation --- p.26
Chapter 3.3.1.4 --- Experiment and result --- p.27
Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28
Chapter 3.3.2.1 --- Hardware components --- p.28
Chapter 3.3.2.2 --- Software components --- p.29
Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29
Chapter 3.3.2.4 --- Experiment and result --- p.30
Chapter 3.4 --- Observation --- p.30
Chapter 4. --- Implementation of the Device --- p.31
Chapter 4.1 --- Choice of platforms --- p.31
Chapter 4.2 --- Implementation Details --- p.31
Chapter 4.2.1 --- Hardware implementation --- p.31
Chapter 4.2.1.1 --- Atmel FingerChip --- p.32
Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33
Chapter 4.2.2 --- Software implementation --- p.33
Chapter 4.2.2.1 --- Operating System --- p.33
Chapter 4.2.2.2 --- File System --- p.33
Chapter 4.2.2.3 --- Device Driver --- p.35
Chapter 4.2.2.4 --- Smart card --- p.38
Chapter 4.2.2.5 --- Fingerprint software --- p.41
Chapter 4.2.2.6 --- Graphical user interface --- p.41
Chapter 4.3 --- Results and observations --- p.44
Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47
Chapter 5.1 --- Requirement --- p.47
Chapter 5.2 --- Design Principles --- p.48
Chapter 5.3 --- Implementation --- p.52
Chapter 5.4 --- Results and Observation --- p.57
Chapter 6. --- Conclusions and future work --- p.62
Chapter 7. --- References --- p.64
Kuo, Chung-hsiu, and 郭仲修. "The Biometric Authentication of Personal Keystroke Pattern." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/46385923094808807245.
Full text朝陽科技大學
資訊工程系碩士班
94
Personal password authentication is an important techanics on the information environment which is rife with fraudulent e-mails, imitation web pages, dictionary attacks, and spywares. Recently, the pattern recognition with keystroke biometric has great improvement, which includes the minimum distance, statistic, neural network, fuzzy control , and parallel decision tree. In this paper, we propose a process by the control chart of the quality control that can be a judgment of key in action whether it is steady state or not, and a method of recognizing the patterns. It overcomes higher variation of keystroke, and it also avoids a large number of training patterns and retraining the system when new member added. The result shows that it can really promote the security of the computer, and reduce the complication of operations and excessive training patterns. It also resolves the features extraction problem, furthermore, it makes a foundation for inquiring into a dynamic state, big unit system and the keystroke recognition of non specific keyboards.
Chen, Kuei-Fu, and 陳癸夫. "SecCap:Automatically Securing Personal Documents with Smartcard Authentication." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/77387438045175474089.
Full text國立交通大學
資訊科學與工程研究所
96
Document security is now an important issue on personal computer. According to the statistics show[25], as high as 92% of end-users are using Microsoft Windows operating system of the world. In which, 90% of users will not encrypt to protect their confidential documents in their computers. More than 80% of security threats are issued from internal of company[20]. If the attacker, who think to steal data, can obtain the computer entity, all unencrypted documents are exposed. The user will not encrypt his confidential documents because he thinks it needs more complex procedure to encrypt them manually, or does not understand the importance of encryption protection. In view of this, in this paper, we propose a software system: SecCap, which is based on NTFS file system, Windows user and key management. SecCap authenticates the user by smartcard, and automatically encrypts the confidential documents with acceptable overhead. This is the main hope to solve above problem, so that users can more easily reach to goal of personal document security.
Hsu, Hsiu-Wei, and 許修維. "Personal Authentication System Using Energy Factors of Iris." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/63627698291847775001.
Full text國立中興大學
資訊科學與工程學系所
97
In this report, we proposed energy factors method analyzes the iris information to distribute and to apply on individual identity confirmation system. When image pre-processing, we obtain iris region information and normalized to a fixed measurable region, after standardization, will carry out second-order wavelet transform and remove non-prominent features. This process will then allow us to carry on re-distribution work and transform these regions to energy factors state. Calculation will be performed on each region’s energy charact-eristic, and this region’s energy content will then be characterized as iris’s finger prints. Utilize these energy characteristics to produce a group of revolving gene. Revolving gene can then be used to compare and make the necessary adjustments. The differences in energy characteristics between two irises can also be used to gauge the similarity of the two. Dual threshold standard can then be applied to examine whether irises fall into the same category. In this report, we carried out system testing on 108 groups and for the total of 756 iris images tested, the proposed method have the success rate of 98.02% in iris identification and equal error rate of 11.69%. In the case of FAR=0 also resulted in low FRR value of 22.97. Hence, this validated our proposed method of using energy factors expressed in iris texture region distributed information. As the result, this process proves to be highly efficient in recognition rate and also under the high security requirements situation.
Jeevan, M. "Behavioual biometrics based personal authentication: gait and voice." Thesis, 2017. http://localhost:8080/xmlui/handle/12345678/7402.
Full textGUPTA, ANKITA. "PERSONAL MULTIMODAL BIOMETRIC AUTHENTICATION USING UNSUPERVISED LEARNING, HIDDEN MARKOV MODEL (HMM)." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14543.
Full textMUKHERJEE, PRERANA. "MULTIMODAL PERSONAL AUTHENTICATION USING GAUSSIAN MIXTURE MODEL AND SUPPORT VECTOR MACHINE." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14397.
Full textYeh, Jung, and 葉. 嶸. "Applying a Secure Authentication Protocol of Personal Health Record System in IOT Environment." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/spttdc.
Full text東海大學
資訊管理學系
106
Patient-centered personal health record systems are promoted in past years, aiming to permanently record personal physiological conditions and health improvement plans. The combination with a mature physiological sensing device could establish personal health record system in the Internet of Things environment to rapidly collect personal information which is transmitted to the back-end for reservation and future access. Nevertheless, the transmission of information is opener under the Internet of Things environment. In comparison with past routes, the identity can be more easily stolen or data are intercepted in the transmission process to further steal patients’ medical records and relevant data of medical institutions and health care personnel. Without an effective security mechanism, the users would not trust such a structure to largely affect the use of the system as well as the promotion and quality of long-term health plans. To protect users’ important privacy from hostile attack and even stealing, the owners should have complete authority to manage personal health records and authorize other users. Such a secure identity authentication mechanism could guarantee that merely legal users could log in the system to acquire the system service resources. Aiming at personal health record system under Internet to Things environment, a user identity authentication mechanism with security and privacy allows medical personnel permanently retrieving the user’s health information and assisting in long-term health care plans. With double authentication mechanisms of password and exclusive smart card, the mechanism allows the owners and the authorized users logging in the system and accessing relevant personal records. The use of cryptosystem based on bilinear pairing for two-way user identity authentication could effectively prevent from hostile invasion and stealing behaviors.
Alshanketi, Faisal. "Enhanced usability, resilience, and accuracy in mobile keystroke dynamic biometric authentication." Thesis, 2018. https://dspace.library.uvic.ca//handle/1828/10093.
Full textGraduate
2019-09-25
Cheng, Fu-Rong, and 鄭復榕. "A Real-Time Web-Based Personal Authentication System with Visemes and Acoustic Biometric Features." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/31792083547696283262.
Full text國立中央大學
資訊工程學系碩士在職專班
93
Phonemes are the basic acoustic elements of a language, and the visemes are the lip shapes of a word while speaking. Since the uttering characteristic/manner is unique to each individual [8] [9], a personal authentication system can fully make use of the biometric information. The biometric uttering features include lip visual features [1-3], visemes [4], and phonemes [4] of an individual. In this thesis, we propose an effectively web-based personal authentication system by utilizing filter model with biometric uttering features in Chinese, that is a user equipped with a web camera can register and log in the system later by the registered biometric uttering features. In our work, we compare and analyze these biometric features, then build 2 GMM classifier, and finally fuse the outputs to a personal authentication system. The consideration of system scalability and networking bandwidth may more or less sacrifice the recognition rate. However, experiments results shows that the proposed system can handle data stream of personal frontal view in 320*240 pixels with 30*15 pixels of lip in reasonable response time and satisfactory recognition rate above 80% can be achieved.
Shih, Kuen-Jhe, and 施崑哲. "Mining a Novel Biometrics to Improve the Accuracy of Personal Authentication in Free Text." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/88422722804989470360.
Full text國立彰化師範大學
數學系所
101
Internet brings people lots of conveniences, but it provides a mode which can spread virus of computer easily and quickly. There are some problems can be showed; for example, people cannot identify personal details to each other accurately on Internet. Also, username as well as password are easily cracked or embezzled. Therefore, cybercrime is highly increased. Recently, some scholars draw keystroke dynamics on free text identification; some relevant researches show that the keystroke dynamics can really improve the accuracy of personal authentication in free text. In order to improve the accuracy of personal authentication in free text, this study proposes a new biometrics referred to KC-Map (Keystroke Clusters Map) by clustering users’ keystrokes. Because KC-Map is the results of clustering, the user’s keystrokes have been non-informed. Therefore, KC-Map is not suitable for the traditional statistical classifier, which is used for authentication. In order to solve this problem, the study also proposes a KCMS classifier (Keystroke Clusters Map Similarity Classifier). Experimental results show that combination of KC-Map and KCMS classifier can improve the accuracy of personal authentication in free text with up to 1.27 times. In addition, there is a big problem on the current free text identification that users are required to be trained for several months. Long training time makes free text identification impractical. Another motivation of this study is to explore if it is possible to shorten the training time in an acceptable range. Experimental results show that users need to carry out only about 20 minutes for training to achieve a good identification accuracy.
Sudoł, Mariusz. "Prawne Aspekty Bankowości Biometrycznej." Doctoral thesis, 2019. https://depotuw.ceon.pl/handle/item/3426.
Full textThe rapid development of e-commerce, in particular banking online services requires strong authentication tools to verify the parties to the transaction. Physical presence of the parties to the agreement and/or transaction is no longer needed. That is why the client’s digital authentication is a crucial process for user’s identity and authorisation confirmation. Using typical password, PIN or token seems to be not efficient tool in particular for high value transactions. Biometric data allow a person to be verified and/or identified and authenticated based on a set of unique data that are specific to each individual person. Based on the physical and/or behavioral individual characteristics the biometric template is created that can be used as a reference for future measurement of people’s data. The template may be stored in central database and/or a smart card, e.g. payment card. Biometrics are used in the process of comparing data being the person's characteristics to that person's biometric "template" in order to determine resemblance. The subject matter of the doctoral dissertation “Legal aspects of biometrics in banking sector” concerns the analysis of the law applicable to usage of biometric data in banking sector. After introduction, the thesis is divided into four chapters, i.e. (i) Description of banking biometric; (ii) Legal nature of biometric data; (iii) Axiological basis for using biometric data by the bank; (iv) Evolution of limits for the use of biometric data. The aim of the work is to answer the question whether Polish law regulates biometric banking in a manner adequate to the development of biometric systems in the banks. The dissertation covers the scientific discussion in the light of current regulations regarding legitimate usage biometric data by banks. There are specified legal conditions, risks and evaluation criteria for the authentication of the client's bank’s employee identity as well as the authorization of banking operations. The legal analysis is focused on the following regulations: (i) The Constitution of the Republic of Poland (ii) The General Data Protection Regulation; (iii) The Payment Services Directive II (iv) Polish Banking Law (v) The Labour Code. Apart from the statutory provisions of the law, the thesis relates to applicable “soft law” regulations applicable to the banking sector, as well as rules resulting from the Court's case-law, needed for the purpose of assessing evolution of the barriers for the development of the biometric solutions. The conducted research allows you to state that the Polish law under the influence of changes resulting from the provisions of EU law has been supplemented by regulations that are more and more able to keep up with the current needs and the state of biometric banking development. Despite the proper direction of changes in legal norms, the regulations concerning biometrics in banking are not comprehensive. In addition, the analysis carried out in the dissertation proved that due to the fact that the bank is a public trust entity pursuing an important public interest in ensuring the security of the funds entrusted to it, the effectiveness of authentication methods has a significant impact on the security of deposits, therefore in this sector there is a strong axiological and systemic justification for the use of biometric data.