Littérature scientifique sur le sujet « Personal Authentication »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Personal Authentication ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Personal Authentication"

1

Noh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park et Youngjoo Shin. « Broken Heart : Privacy Leakage Analysis on ECG-Based Authentication Schemes ». Security and Communication Networks 2022 (29 septembre 2022) : 1–14. http://dx.doi.org/10.1155/2022/7997509.

Texte intégral
Résumé :
Authentications using biometrics, such as fingerprint recognition and electrocardiogram (ECG), have been actively used in various applications. Unlike traditional authentication methods, such as passwords or PINs, biometric-based authentication has an advantage in terms of security owing to its capability of liveness detection. Among the various types of biometrics, ECG-based authentication is widely utilized in many fields. Because of the inherent characteristics of ECG, however, the incautious design of ECG-based authentication may result in serious leakage of personal private information. In this paper, we extensively investigate ECG-based authentication schemes previously proposed in the literature and analyze possible privacy leakages by employing machine learning and deep learning techniques. We found that most schemes suffer from vulnerabilities that lead to the leakage of personal information, such as gender, age, and even diseases. We also identified some privacy-insensitive ECG fiducial points by utilizing feature selection algorithms. Based on these features, we present a privacy-preserving ECG-based authentication scheme.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ariyama, Hirotaka. « A Personal Authentication Method ». IEEJ Transactions on Electronics, Information and Systems 107, no 1 (1987) : 62–66. http://dx.doi.org/10.1541/ieejeiss1987.107.1_62.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kumar, Ajay, David C. M. Wong, Helen C. Shen et Anil K. Jain. « Personal authentication using hand images ». Pattern Recognition Letters 27, no 13 (octobre 2006) : 1478–86. http://dx.doi.org/10.1016/j.patrec.2006.02.021.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ortega-Garcia, J., J. Bigun, D. Reynolds et J. Gonzalez-Rodriguez. « Authentication gets personal with biometrics ». IEEE Signal Processing Magazine 21, no 2 (mars 2004) : 50–62. http://dx.doi.org/10.1109/msp.2004.1276113.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mahesh, Renuka. « Personal Authentication Using Finger Images ». International Journal on Recent and Innovation Trends in Computing and Communication 3, no 1 (2015) : 389–93. http://dx.doi.org/10.17762/ijritcc2321-8169.150177.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kang, Hyeok, Keun-Ho Lee et Gui-Jung Kim. « Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication ». Cluster Computing 22, S1 (22 novembre 2017) : 2017–26. http://dx.doi.org/10.1007/s10586-017-1234-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Maslova, N. O., et D. O. Polunina. « BIOMETRIC AUTHENTICATION METHODS FOR PERSONAL IDENTIFICATION ». Naukovyi visnyk Donetskoho natsionalnoho tekhnichnoho universytetu 1(2), no 2(3) (2019) : 12–20. http://dx.doi.org/10.31474/2415-7902-2019-1(2)-2(3)-12-20.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kumar, Ajay, et Ch Ravikanth. « Personal Authentication Using Finger Knuckle Surface ». IEEE Transactions on Information Forensics and Security 4, no 1 (mars 2009) : 98–110. http://dx.doi.org/10.1109/tifs.2008.2011089.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Moon, Jaegeun, et Im Y. Jung. « Authentication for Wireless Personal Area Network ». Advanced Science Letters 23, no 10 (1 octobre 2017) : 9713–17. http://dx.doi.org/10.1166/asl.2017.9781.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Lin, Hung-Yu, et Lein Harn. « Authentication protocols for personal communication systems ». ACM SIGCOMM Computer Communication Review 25, no 4 (octobre 1995) : 256–61. http://dx.doi.org/10.1145/217391.217456.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Personal Authentication"

1

Wong, Chin Man. « Personal identification/authentication by using hand geometry / ». View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WONG.

Texte intégral
Résumé :
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003.
Includes bibliographical references (leaves 104-109). Also available in electronic version. Access restricted to campus users.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Nosseir, Ann. « Towards authentication via selected extraction from electronic personal history ». Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501883.

Texte intégral
Résumé :
Confidential electronic services such as chat, e-commerce and banking services should be accessible by their clients at any time and from anywhere. This sets new requirements for a cheap, usable, and safe authentication mechanism. Knowledge-based authentication, such as the use of passwords, is relatively convenient, easy and cheap to implement. However, it suffers from memorability problems that lead to insecure behaviour such as users writing down passwords, or choosing guessable passwords. The best techniques that build on the how the human memory operates use personal information and images. However, these techniques are also more vulnerable to guessability (De-Angeli et al. 2005)attacks especially by friends and family.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Enany, Ahmed. « Achieving Security in Messaging and Personal Content in Symbian Phones ». Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5635.

Texte intégral
Résumé :
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algorithm to secure the mobile content. Due to some of the disadvantages imposed by the Identity Based Cryptography, we recommended using it along with the RSA algorithm. The proposed schemes were implemented in java and tested on an actual device, Nokia N70. In addition, we measured the time required by each of the algorithms we used to encrypt/decrypt a certain number of bytes. We found that the time taken by RSA and Blowfish algorithms will not be noticeable by the user. However, since the implementation of the Identity Based Cryptography we used was not meant to run on mobile devices, we encountered a noticeable delay whenever encrypting/decrypting the data using this algorithm. Securing the SMS messages will make it to be considered as one of the proposed means that could be used to conduct m-commerce. In addition, securing the MMS messages and the mobile content will increase the usability and the reliability of the mobile phones especially to the users on the move.
Phone: +46735731360
Styles APA, Harvard, Vancouver, ISO, etc.
4

Mahboubi, Arash. « Security of critical information infrastructures exposed to mobile personal devices ». Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/118743/1/Arash_Mahboubi_Thesis.pdf.

Texte intégral
Résumé :
Mobile personal devices with USB communication capabilities are essential elements of our modern lives. Their large-scale pervasive deployment within the population has promoted many malware attacks some of which are capable of infiltrating physically isolated critical control systems. This research investigates mobile malware capable of infecting and spreading through a system with heterogeneous computing, communication and storage components. Two novel prevention methods are presented: user accountability and system immunity. While the former uses a novel intrusive USB authentication, authorization and accounting solution, the latter exploits coding theory to make the system immune and allergic to the malware behaviour.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mendoza, Patricia A. « An enhanced method for the existing bluetooth pairing protocol to avoid impersonation attacks ». To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ullah, Abrar. « Security and usability of authentication by challenge questions in online examination ». Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/18186.

Texte intégral
Résumé :
Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including intrusion by hackers and collusion. Collu-sion happens when a student invites a third party to impersonate him/her in an online test, or to abet with the exam questions. This research proposed a profile-based chal-lenge question approach to create and consolidate a student's profile during the learning process, to be used for authentication in the examination process. The pro-posed method was investigated in six research studies using a usability test method and a risk-based security assessment method, in order to investigate usability attributes and security threats. The findings of the studies revealed that text-based questions are prone to usability issues such as ambiguity, syntactic variation, and spelling mistakes. The results of a usability analysis suggested that image-based questions are more usable than text-based questions (p < 0.01). The findings identified that dynamic profile questions are more efficient and effective than text-based and image-based questions (p < 0.01). Since text-based questions are associated with an individual's personal information, they are prone to being shared with impersonators. An increase in the numbers of chal-lenge questions being shared showed a significant linear trend (p < 0.01) and increased the success of an impersonation attack. An increase in the database size decreased the success of an impersonation attack with a significant linear trend (p < 0.01). The security analysis of dynamic profile questions revealed that an impersonation attack was not successful when a student shared credentials using email asynchronously. However, a similar attack was successful when a student and impersonator shared information in real time using mobile phones. The response time in this attack was significantly different when a genuine student responded to his challenge questions (p < 0.01). The security analysis revealed that the use of dynamic profile questions in a proctored exam can influence impersonation and abetting. This view was supported by online programme tutors in a focus group study.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Batie, Robert B. « Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism ». NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.

Texte intégral
Résumé :
The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reliable user authentication techniques has increased in the wake of heightened concerns about information security and rapid advancements in networking, communication, and mobility. The main goal of this research study was to examine the role of the authentication method (BIO-PIN™ or username/password) and time, on the effectiveness of authentication, as well as the users’ ability to remember the BIO-PIN™ versus username/password (UN/PW). Moreover, this study compared the BIO-PIN™ with a traditional multi-factor biometric authentication using multiple fingerprints (without sequence) and a numerical PIN sequence (noted as "BIO+PIN"). Additionally, this research study examined the authentication methods when controlled for age, gender, user’s computer experience, and number of accounts. This study used a quasi-experimental multiple baseline design method to evaluate the effectiveness of the BIO-PIN™ authentication method. The independent, dependent, and control variables were addressed using descriptive statistics and Multivariate Analysis of Variance (MANOVA) statistical analysis to compare the BIO-PIN™, the BIO+PIN, and UN/PW authentication methods for research questions (RQs) 1 and 2. Additionally, the Multivariate Analysis of Covariance (MANCOVA) was used to address RQ 3 and RQ4, which seeks to test any differences when controlled by age, gender, user experience, and number of accounts. This research study was conducted over a 10-week period with participant engagement occurring over time including a registration week and in intervals of 2 weeks, 3 weeks, and 5 weeks. This study advances the current research in multi-factor biometric authentication and increases the body of knowledge regarding users’ ability to remember industry standard UN/PWs, the BIO-PIN™ sequence, and traditional BIO+PIN.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Marnell, Joseph. « An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access Environments ». NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/970.

Texte intégral
Résumé :
Over the course of history, different means of object and person identification as well as verification have evolved for user authentication. In recent years, a new concern has emerged regarding the accuracy of verifiable authentication and protection of personal identifying information (PII), because previous misuses have resulted in significant financial loss. Such losses have escalated more noticeably because of human identity-theft incidents due to breaches of PII within multiple public-access environments. Although the use of various biometric and radio frequency identification (RFID) technologies is expanding, resistance to using these technologies for user authentication remains an issue. This study addressed the effect of individuals’ perceptions on their resistance to using multi-method authentication systems (RMS) in public-access environments and uncovered key constructs that may significantly contribute to such resistance. This study was a predictive study to assess the contributions of individuals’ perceptions of the importance of organizational protection of their PII, noted as Perceived Value of Organizational Protection of PII (PVOP), authentication complexity (AC), and invasion of privacy (IOP) on their resistance to using multi-method authentication systems (RMS) in public-access environments. Moreover, this study also investigated if there were any significant differences on the aforementioned constructs based on age, gender, prior experience with identity theft, and acquaintance experience with identity theft. As part of this study, a rollout project was implemented of multi-factor biometric and RFID technologies for system authentication prior to electronic-commerce (e-commerce) use in public-access environments. The experimental group experienced the multi-factor authentication and also was trained on its use. Computer users (faculty & students) from a small, private university participated in the study to determine their level of PVOP, IOP, and AC on their resistance to using the technology in public-access environments. Multiple Linear Regression (MLR) was used to formulate a model and test predictive power along with the significance of the contribution of the aforementioned constructs on RMS. The results show that all construct measures demonstrated very high reliability. The results also indicate that the experimental group of the multi-factor authentication had lower resistance than the control group that didn’t use the technology. The mean increases indicate an overall statistically significant difference between the experimental and control groups overall. The results also demonstrate that students and participants’ increased levels of education indicate an overall statistically significant decrease in resistance. The findings demonstrate that overall computer authentication training do provide added value in the context of measuring resistance to using newer multi-method authentication technology.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Putz, Daniel Robert. « Spam on the phone - VoIP and its biggest weakness : Studies about the users’ willingness to offer personal information in order to avoid VoIP spam ». Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1393.

Texte intégral
Résumé :

It is very probable that VoIP will soon replace the ordinary telephone. Beside all advantages of the digital voice-connection it is linked to the danger of spam on the telephone. A lot of approaches have been developed to solve the problem of VoIP spam. Because some of these solutions are based on access to personal information of its users, a broad discussion about the best and most ethical approach has started.

This thesis analyzes the users’ point of view towards the VoIP spam problem and the extent of users’ willingness to offer private information in order to avoid VoIP spam. It presents results from a qualitative and a quantitative research as well as approaches for a most realistic- and most promising VoIP solution. These new approaches are based on the results of the research.

The main points of the results showed that users were not willing to offer private information to companies and that they were not willing to pay any amount of money for VoIP spam solutions. Users held governmental organisations and telephone operators responsible for finding a solution against VoIP spam.

Styles APA, Harvard, Vancouver, ISO, etc.
10

Au, Wai Ki Richard. « Agent-based one-shot authorisation scheme in a commercial extranet environment ». Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16708/1/Wai_Ki_Au_Thesis.pdf.

Texte intégral
Résumé :
The enormous growth of the Internet and the World Wide Web has provided the opportunity for an enterprise to extend its boundaries in the global business environment. While commercial functions can be shared among a variety of strategic allies - including business partners and customers, extranets appear to be the cost-effective solution to providing global connectivity for different user groups. Because extranets allow third-party users into corporate networks, they need to be extremely secure and external access needs to be highly controllable. Access control and authorisation mechanisms must be in place to regulate user access to information/resources in a manner that is consistent with the current set of policies and practices both at intra-organisational and cross-organisational levels. In the business-to-customer (B2C) e-commerce setting, a service provider faces a wide spectrum of new customers, who may not have pre-existing relationships established. Thus the authorisation problem is particularly complex. In this thesis, a new authorisation scheme is proposed to facilitate the service provider to establish trust with potential customers, grant access privileges to legitimate users and enforce access control in a diversified commercial environment. Four modules with a number of innovative components and mechanisms suitable for distributed authorisation on extranets are developed: * One-shot Authorisation Module - One-shot authorisation token is designed as a flexible and secure credential for access control enforcement in client/server systems; * Token-Based Trust Establishment Module - Trust token is proposed for server-centric trust establishment in virtual enterprise environment. * User-Centric Anonymous Authorisation Module - One-task authorisation key and anonymous attribute certificate are developed for anonymous authorisation in a multi-organisational setting; * Agent-Based Privilege Negotiation Module - Privilege negotiation agents are proposed to provide dynamic authorisation services with secure client agent environment for hosting these agents on user's platform
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Personal Authentication"

1

Masao, Togawa, et Denshi Jōhō Tsūshin Gakkai (Japan), dir. Netto shakai to honnin ninshō : Genri kara ōyō made = Personal authentication : principles, technologies and applications. Tōkyō : Denshi Jōhō Tsūshin Gakkai, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sánchez Moltó, Manuel Vicente, writer of introduction, dir. La partida de bautismo de Miguel de Cervantes y sus detractores. Alcalá de Henares : Universidad de Alcalá, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Personal authentication using verified electronic document. European Scientific e-Journal, 2017. http://dx.doi.org/10.47451/inn2020-09-001.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Koien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Koien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Koien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Holt, Else K. The Prophet as Persona. Sous la direction de Carolyn J. Sharp. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199859559.013.17.

Texte intégral
Résumé :
Taking the discussion of persona in literary theory as its point of departure, the chapter examines first the presentation of prophets in twentieth-century historical-critical scholarship. Here, the interest was moving from the early focus on the prophet as an historical person (e.g. Duhm, Skinner, Rudolph) to the historical background and development of the prophetic book (e.g. Zimmerli, Holladay, Carroll). Second, the genre of prophetic books is discussed in the light of ancient biography, suggesting a general cognitive demand for personal authentication of messages as being met by (the image of) the prophet. The third part of the chapter presents literary readings of the prophets as literarypersonae, i.e. as representations of the message of the prophetic books, with an emphasis on Hosea, Amos, Ezekiel and Jeremiah. The quest for the literary persona thus leads toward synchronic approaches to the theology of the books.
Styles APA, Harvard, Vancouver, ISO, etc.
10

French, Derek, Stephen W. Mayson et Christopher L. Ryan. 19. Acting for a company : agency and attribution. Oxford University Press, 2016. http://dx.doi.org/10.1093/he/9780198778301.003.0019.

Texte intégral
Résumé :
This chapter deals with the legal relationship of agency that exists between the company and the agent, explaining the process involved in an agent’s authentication and the execution of documents for the company he or she represents. It then considers two ways in which a company may become contractually bound to another person (a ‘contractor’) under the provisions of the Companies Act 2006: through a written contract to which the company’s common seal is affixed, or when someone has made a contract on behalf of the company. It also discusses the company’s capacity to enter into contracts, with emphasis on the ultra vires rule, and attribution by a court so as to impose criminal liability on a company. A number of court cases relevant to the discussion are cited.
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Personal Authentication"

1

Zhang, David D. « Personal Authentication ». Dans Automated Biometrics, 269–88. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4519-4_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lizárraga, Miguel G., et Lee L. Ling. « Biometric Personal Authentication Based on Handwritten Signals ». Dans Biometric Authentication, 533–39. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_73.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Jain, Anil K., Sarat C. Dass et Karthik Nandakumar. « Soft Biometric Traits for Personal Recognition Systems ». Dans Biometric Authentication, 731–38. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_99.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Poon, Carmen, David C. M. Wong et Helen C. Shen. « Personal Identification and Verification : Fusion of Palmprint Representations ». Dans Biometric Authentication, 782–88. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_106.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Li, Qiang, Zhengding Qiu, Dongmei Sun et Jie Wu. « Personal Identification Using Knuckleprint ». Dans Advances in Biometric Person Authentication, 680–89. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_78.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zhao, Weinan, Wenxin Li, Tao Wang et Zhuoqun Xu. « A Palmprint Acquisition Device with Time-Sharing Light Source Used in Personal Verification ». Dans Biometric Authentication, 768–74. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_104.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

You, Jane, Wai-Kin Kong, David Zhang et King Hong Cheung. « A New Approach to Personal Identification in Large Databases by Hierarchical Palmprint Coding with Multi-features ». Dans Biometric Authentication, 739–45. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_100.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Khan, Muhammad Khurram, Jiashu Zhang et Lei Tian. « Protecting Biometric Data for Personal Identification ». Dans Advances in Biometric Person Authentication, 629–38. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_72.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Yuan, Li, Zhichun Mu et Zhengguang Xu. « Using Ear Biometrics for Personal Recognition ». Dans Advances in Biometric Person Authentication, 221–28. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947_28.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

He, Yuqing, Yangsheng Wang et Tieniu Tan. « Iris Image Capture System Design for Personal Identification ». Dans Advances in Biometric Person Authentication, 539–45. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_61.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Personal Authentication"

1

Boechat, Glaucya C., Jeneffer C. Ferreira et Edson C. B. Carvalho Filho. « Authentication personal ». Dans 2007 International Conference on Intelligent and Advanced Systems (ICIAS). IEEE, 2007. http://dx.doi.org/10.1109/icias.2007.4658385.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ayeswarya, S., et Jasmine Norman. « Seamless Personal Authentication using Biometrics ». Dans 2019 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2019. http://dx.doi.org/10.1109/i-pact44901.2019.8960070.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Aghili, Bahareh, et Hamed Sadjedi. « Personal Authentication Using Hand Geometry ». Dans 2009 International Conference on Computational Intelligence and Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/cise.2009.5363947.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Uesugi, Yuta, Takako Nonaka et Tomohiro Hase. « AV control with personal authentication ». Dans 2010 IEEE 14th International Symposium on Consumer Electronics - (ISCE 2010). IEEE, 2010. http://dx.doi.org/10.1109/isce.2010.5523717.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Lin, Hung-Yu, et Lein Harn. « Authentication protocols for personal communication systems ». Dans the conference. New York, New York, USA : ACM Press, 1995. http://dx.doi.org/10.1145/217382.217456.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rabkin, Ariel. « Personal knowledge questions for fallback authentication ». Dans the 4th symposium. New York, New York, USA : ACM Press, 2008. http://dx.doi.org/10.1145/1408664.1408667.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kumar, Ajay, et K. Venkata Prathyusha. « Personal authentication using hand vein triangulation ». Dans SPIE Defense and Security Symposium, sous la direction de B. V. K. Vijaya Kumar, Salil Prabhakar et Arun A. Ross. SPIE, 2008. http://dx.doi.org/10.1117/12.779159.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kao, Yung-Wei, Hui-Zhen Gu et Shyan-Ming Yuan. « Personal Based Authentication by Face Recognition ». Dans 2008 Fourth International Conference on Networked Computing and Advanced Information Management (NCM). IEEE, 2008. http://dx.doi.org/10.1109/ncm.2008.167.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Hayashi, Hitoshi. « Personal authentication using spatial and temporal information reading the personal data ». Dans 2009 IEEE 13th International Symposium on Consumer Electronics. IEEE, 2009. http://dx.doi.org/10.1109/isce.2009.5156940.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Tao, Qian, et Raymond N. J. Veldhuis. « Biometric Authentication for a Mobile Personal Device ». Dans 2006 Third Annual International Conference on Mobile and Ubiquitous Systems : Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340409.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie