Journal articles on the topic 'Personal Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Personal Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Noh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin. "Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes." Security and Communication Networks 2022 (September 29, 2022): 1–14. http://dx.doi.org/10.1155/2022/7997509.
Full textAriyama, Hirotaka. "A Personal Authentication Method." IEEJ Transactions on Electronics, Information and Systems 107, no. 1 (1987): 62–66. http://dx.doi.org/10.1541/ieejeiss1987.107.1_62.
Full textKumar, Ajay, David C. M. Wong, Helen C. Shen, and Anil K. Jain. "Personal authentication using hand images." Pattern Recognition Letters 27, no. 13 (October 2006): 1478–86. http://dx.doi.org/10.1016/j.patrec.2006.02.021.
Full textOrtega-Garcia, J., J. Bigun, D. Reynolds, and J. Gonzalez-Rodriguez. "Authentication gets personal with biometrics." IEEE Signal Processing Magazine 21, no. 2 (March 2004): 50–62. http://dx.doi.org/10.1109/msp.2004.1276113.
Full textMahesh, Renuka. "Personal Authentication Using Finger Images." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 1 (2015): 389–93. http://dx.doi.org/10.17762/ijritcc2321-8169.150177.
Full textKang, Hyeok, Keun-Ho Lee, and Gui-Jung Kim. "Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication." Cluster Computing 22, S1 (November 22, 2017): 2017–26. http://dx.doi.org/10.1007/s10586-017-1234-4.
Full textMaslova, N. O., and D. O. Polunina. "BIOMETRIC AUTHENTICATION METHODS FOR PERSONAL IDENTIFICATION." Naukovyi visnyk Donetskoho natsionalnoho tekhnichnoho universytetu 1(2), no. 2(3) (2019): 12–20. http://dx.doi.org/10.31474/2415-7902-2019-1(2)-2(3)-12-20.
Full textKumar, Ajay, and Ch Ravikanth. "Personal Authentication Using Finger Knuckle Surface." IEEE Transactions on Information Forensics and Security 4, no. 1 (March 2009): 98–110. http://dx.doi.org/10.1109/tifs.2008.2011089.
Full textMoon, Jaegeun, and Im Y. Jung. "Authentication for Wireless Personal Area Network." Advanced Science Letters 23, no. 10 (October 1, 2017): 9713–17. http://dx.doi.org/10.1166/asl.2017.9781.
Full textLin, Hung-Yu, and Lein Harn. "Authentication protocols for personal communication systems." ACM SIGCOMM Computer Communication Review 25, no. 4 (October 1995): 256–61. http://dx.doi.org/10.1145/217391.217456.
Full textHan, Chin-Chuan, Hsu-Liang Cheng, Chih-Lung Lin, and Kuo-Chin Fan. "Personal authentication using palm-print features." Pattern Recognition 36, no. 2 (February 2003): 371–81. http://dx.doi.org/10.1016/s0031-3203(02)00037-7.
Full textKumar, Ajay, and David Zhang. "Personal authentication using multiple palmprint representation." Pattern Recognition 38, no. 10 (October 2005): 1695–704. http://dx.doi.org/10.1016/j.patcog.2005.03.012.
Full textFons, Mariano, Francisco Fons, Enrique Cantó, and Mariano López. "FPGA-based Personal Authentication Using Fingerprints." Journal of Signal Processing Systems 66, no. 2 (October 15, 2011): 153–89. http://dx.doi.org/10.1007/s11265-011-0629-3.
Full textMariño, C., M. G. Penedo, M. Penas, M. J. Carreira, and F. Gonzalez. "Personal authentication using digital retinal images." Pattern Analysis and Applications 9, no. 1 (January 10, 2006): 21–33. http://dx.doi.org/10.1007/s10044-005-0022-6.
Full textFeng, Xuanang, Yi Zuo, Eisuke Kita, and Fumiya Saito. "Personal Authentication Using a Kinect Sensor." Review of Socionetwork Strategies 11, no. 2 (November 28, 2017): 201–15. http://dx.doi.org/10.1007/s12626-017-0010-5.
Full textZukarnain, Zuriati Ahmad, Amgad Muneer, and Mohd Khairulanuar Ab Aziz. "Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges." Symmetry 14, no. 4 (April 14, 2022): 821. http://dx.doi.org/10.3390/sym14040821.
Full textB S, Shruthi, and Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD." International Journal of Computer Science and Mobile Computing 12, no. 4 (April 30, 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Full textShin, Siho, Mingu Kang, Jaehyo Jung, and Youn Tae Kim. "Development of Miniaturized Wearable Wristband Type Surface EMG Measurement System for Biometric Authentication." Electronics 10, no. 8 (April 13, 2021): 923. http://dx.doi.org/10.3390/electronics10080923.
Full textLoginovskiy, O. V., M. E. Koval, and A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.
Full textLee, Sun-Woo, Duk-Kyun Woo, and Pyeong-Soo Mah. "Personal Authentication Method using Segment PPG signals." Journal of the Institute of Electronics and Information Engineers 56, no. 6 (June 30, 2019): 45–51. http://dx.doi.org/10.5573/ieie.2019.56.6.45.
Full textMalassiotis, S., N. Aifanti, and M. G. Strintzis. "Personal Authentication Using 3-D Finger Geometry." IEEE Transactions on Information Forensics and Security 1, no. 1 (March 2006): 12–21. http://dx.doi.org/10.1109/tifs.2005.863508.
Full textTao, Qian, and Raymond Veldhuis. "Biometric Authentication System on Mobile Personal Devices." IEEE Transactions on Instrumentation and Measurement 59, no. 4 (April 2010): 763–73. http://dx.doi.org/10.1109/tim.2009.2037873.
Full textLim, Dai-Hwan. "Personal Authentication System Using Multimodal Biometric Algorithm." Journal of Korean Institute of Information Technology 15, no. 12 (December 21, 2017): 147–56. http://dx.doi.org/10.14801/jkiit.2017.15.12.147.
Full textHsu, Chih-Bin. "Personal authentication through dorsal hand vein patterns." Optical Engineering 50, no. 8 (August 1, 2011): 087201. http://dx.doi.org/10.1117/1.3607413.
Full textZhang, Chongyang. "Representation of face images for personal authentication." Optik - International Journal for Light and Electron Optics 124, no. 17 (September 2013): 2985–92. http://dx.doi.org/10.1016/j.ijleo.2012.09.015.
Full textUmamaheswari.R, Umamaheswari R. "An Enhanced Biometric System for Personal Authentication." IOSR Journal of Electronics and Communication Engineering 6, no. 3 (2013): 63–69. http://dx.doi.org/10.9790/2834-0636396.
Full textVyshnevsky, V. V., T. M. Romanenko, Yu O. Luhovsky, and O. F. Boretsky. "Data preparation services for the authentication of people by their electrocardiogram." Mathematical machines and systems 3 (2022): 58–69. http://dx.doi.org/10.34121/1028-9763-2022-3-58-69.
Full textHuang, Juanjuan, Yuhang Xue, and Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems." Processes 11, no. 1 (January 6, 2023): 190. http://dx.doi.org/10.3390/pr11010190.
Full textR, Dr Sharavanakumar. "EYE Blinking for Password Authentication." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Full textSenthil Kumar, T., S. Prabhakaran, and V. Prashanth. "Four-way handshake protocol for authenticating in multiple mix-zones." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 200. http://dx.doi.org/10.14419/ijet.v7i2.4.13039.
Full textNanglae, Nilobon, Bello Musa Yakubu, and Pattarasinee Bhattarakosol. "Extraction of Hidden Authentication Factors from Possessive Information." Journal of Sensor and Actuator Networks 12, no. 4 (August 11, 2023): 62. http://dx.doi.org/10.3390/jsan12040062.
Full textRajagopal, Gayathri, and Senthil Kumar Manoharan. "Personal Authentication Using Multifeatures Multispectral Palm Print Traits." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/861629.
Full textChoi, Jiwoo, Sangil Choi, and Taewon Kang. "Smartphone Authentication System Using Personal Gaits and a Deep Learning Model." Sensors 23, no. 14 (July 14, 2023): 6395. http://dx.doi.org/10.3390/s23146395.
Full textRajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.
Full textChaudhary, Sumit, Monika Garg, and Neha Singh. "IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 428–32. http://dx.doi.org/10.24297/ijct.v3i3a.2950.
Full textKim, Hanvit, Haena Kim, Se Chun, Jae-Hwan Kang, Ian Oakley, Youryang Lee, Jun Ryu, et al. "A Wearable Wrist Band-Type System for Multimodal Biometrics Integrated with Multispectral Skin Photomatrix and Electrocardiogram Sensors." Sensors 18, no. 8 (August 20, 2018): 2738. http://dx.doi.org/10.3390/s18082738.
Full textAsha G. M, Asha G. M., and Latha B. M. Latha B. M. "Feature Extraction of an Iris for Personal Authentication Based on Gabor Wavelet." International Journal of Scientific Research 2, no. 5 (June 1, 2012): 260–62. http://dx.doi.org/10.15373/22778179/may2013/86.
Full textYang, Tay Yi, Palaniappan Shamala, Muruga Chinniah, and Cik Feresa Mohd Foozy. "Graphical Password Authentication For Child Personal Storage Application." Journal of Physics: Conference Series 1793, no. 1 (February 1, 2021): 012065. http://dx.doi.org/10.1088/1742-6596/1793/1/012065.
Full textZHU, Le-Qing, San-Yuan ZHANG, and Rui XING. "Automatic Personal Authentication Based on Finger Phalangeal Prints." Acta Automatica Sinica 35, no. 7 (August 10, 2009): 875–81. http://dx.doi.org/10.3724/sp.j.1004.2009.00875.
Full textThapliyal, Amitabh, Om Prakash Verma, and Amioy Kumar. "Behavioral biometric based personal authentication in feature phones." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 802. http://dx.doi.org/10.11591/ijece.v12i1.pp802-815.
Full textVerma, Gaurav, and Aloka Sinha. "Digital holographic-based cancellable biometric for personal authentication." Journal of Optics 18, no. 5 (March 24, 2016): 055705. http://dx.doi.org/10.1088/2040-8978/18/5/055705.
Full textXiangqian Wu, D. Zhang, and Kuanquan Wang. "Palm line extraction and matching for personal authentication." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 36, no. 5 (September 2006): 978–87. http://dx.doi.org/10.1109/tsmca.2006.871797.
Full textHsu, Chih-Bin. "Errata: Personal authentication through dorsal hand vein patterns." Optical Engineering 50, no. 9 (September 1, 2011): 099802. http://dx.doi.org/10.1117/1.3645079.
Full textZhang, Lin, Lei Zhang, David Zhang, and Hailong Zhu. "Online finger-knuckle-print verification for personal authentication." Pattern Recognition 43, no. 7 (July 2010): 2560–71. http://dx.doi.org/10.1016/j.patcog.2010.01.020.
Full textKang, Jae-Hwan, Young Chang Jo, and Sung-Phil Kim. "Electroencephalographic feature evaluation for improving personal authentication performance." Neurocomputing 287 (April 2018): 93–101. http://dx.doi.org/10.1016/j.neucom.2018.01.074.
Full textKarnan, M., M. Akila, and N. Krishnaraj. "Biometric personal authentication using keystroke dynamics: A review." Applied Soft Computing 11, no. 2 (March 2011): 1565–73. http://dx.doi.org/10.1016/j.asoc.2010.08.003.
Full textSaito, F., A. Hara, N. Kubo, and E. Kita. "1406 Study on Personal Authentication by Kinect Sensor." Proceedings of Design & Systems Conference 2014.24 (2014): _1406–1_—_1406–5_. http://dx.doi.org/10.1299/jsmedsd.2014.24._1406-1_.
Full textChoi, Jiwoo, Sangil Choi, and Taewon Kang. "Smartphone Authentication System using Personal Gaits and CNN." Journal of Korean Institute of Information Technology 20, no. 10 (October 31, 2022): 71–82. http://dx.doi.org/10.14801/jkiit.2022.20.10.71.
Full textZiyatbekova, G. Z., and M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, no. 4 (December 30, 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Full textBao, Song De. "A Security Authentication Method of Mobile RFID." Advanced Materials Research 268-270 (July 2011): 1077–81. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1077.
Full text