Добірка наукової літератури з теми "Personal Authentication"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Personal Authentication".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Personal Authentication"
Noh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin. "Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes." Security and Communication Networks 2022 (September 29, 2022): 1–14. http://dx.doi.org/10.1155/2022/7997509.
Повний текст джерелаAriyama, Hirotaka. "A Personal Authentication Method." IEEJ Transactions on Electronics, Information and Systems 107, no. 1 (1987): 62–66. http://dx.doi.org/10.1541/ieejeiss1987.107.1_62.
Повний текст джерелаKumar, Ajay, David C. M. Wong, Helen C. Shen, and Anil K. Jain. "Personal authentication using hand images." Pattern Recognition Letters 27, no. 13 (October 2006): 1478–86. http://dx.doi.org/10.1016/j.patrec.2006.02.021.
Повний текст джерелаOrtega-Garcia, J., J. Bigun, D. Reynolds, and J. Gonzalez-Rodriguez. "Authentication gets personal with biometrics." IEEE Signal Processing Magazine 21, no. 2 (March 2004): 50–62. http://dx.doi.org/10.1109/msp.2004.1276113.
Повний текст джерелаMahesh, Renuka. "Personal Authentication Using Finger Images." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 1 (2015): 389–93. http://dx.doi.org/10.17762/ijritcc2321-8169.150177.
Повний текст джерелаKang, Hyeok, Keun-Ho Lee, and Gui-Jung Kim. "Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication." Cluster Computing 22, S1 (November 22, 2017): 2017–26. http://dx.doi.org/10.1007/s10586-017-1234-4.
Повний текст джерелаMaslova, N. O., and D. O. Polunina. "BIOMETRIC AUTHENTICATION METHODS FOR PERSONAL IDENTIFICATION." Naukovyi visnyk Donetskoho natsionalnoho tekhnichnoho universytetu 1(2), no. 2(3) (2019): 12–20. http://dx.doi.org/10.31474/2415-7902-2019-1(2)-2(3)-12-20.
Повний текст джерелаKumar, Ajay, and Ch Ravikanth. "Personal Authentication Using Finger Knuckle Surface." IEEE Transactions on Information Forensics and Security 4, no. 1 (March 2009): 98–110. http://dx.doi.org/10.1109/tifs.2008.2011089.
Повний текст джерелаMoon, Jaegeun, and Im Y. Jung. "Authentication for Wireless Personal Area Network." Advanced Science Letters 23, no. 10 (October 1, 2017): 9713–17. http://dx.doi.org/10.1166/asl.2017.9781.
Повний текст джерелаLin, Hung-Yu, and Lein Harn. "Authentication protocols for personal communication systems." ACM SIGCOMM Computer Communication Review 25, no. 4 (October 1995): 256–61. http://dx.doi.org/10.1145/217391.217456.
Повний текст джерелаДисертації з теми "Personal Authentication"
Wong, Chin Man. "Personal identification/authentication by using hand geometry /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WONG.
Повний текст джерелаIncludes bibliographical references (leaves 104-109). Also available in electronic version. Access restricted to campus users.
Nosseir, Ann. "Towards authentication via selected extraction from electronic personal history." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501883.
Повний текст джерелаEnany, Ahmed. "Achieving Security in Messaging and Personal Content in Symbian Phones." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5635.
Повний текст джерелаPhone: +46735731360
Mahboubi, Arash. "Security of critical information infrastructures exposed to mobile personal devices." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/118743/1/Arash_Mahboubi_Thesis.pdf.
Повний текст джерелаMendoza, Patricia A. "An enhanced method for the existing bluetooth pairing protocol to avoid impersonation attacks." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Повний текст джерелаUllah, Abrar. "Security and usability of authentication by challenge questions in online examination." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/18186.
Повний текст джерелаBatie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.
Повний текст джерелаMarnell, Joseph. "An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access Environments." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/970.
Повний текст джерелаPutz, Daniel Robert. "Spam on the phone - VoIP and its biggest weakness : Studies about the users’ willingness to offer personal information in order to avoid VoIP spam." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1393.
Повний текст джерелаIt is very probable that VoIP will soon replace the ordinary telephone. Beside all advantages of the digital voice-connection it is linked to the danger of spam on the telephone. A lot of approaches have been developed to solve the problem of VoIP spam. Because some of these solutions are based on access to personal information of its users, a broad discussion about the best and most ethical approach has started.
This thesis analyzes the users’ point of view towards the VoIP spam problem and the extent of users’ willingness to offer private information in order to avoid VoIP spam. It presents results from a qualitative and a quantitative research as well as approaches for a most realistic- and most promising VoIP solution. These new approaches are based on the results of the research.
The main points of the results showed that users were not willing to offer private information to companies and that they were not willing to pay any amount of money for VoIP spam solutions. Users held governmental organisations and telephone operators responsible for finding a solution against VoIP spam.
Au, Wai Ki Richard. "Agent-based one-shot authorisation scheme in a commercial extranet environment." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16708/1/Wai_Ki_Au_Thesis.pdf.
Повний текст джерелаКниги з теми "Personal Authentication"
Masao, Togawa, and Denshi Jōhō Tsūshin Gakkai (Japan), eds. Netto shakai to honnin ninshō: Genri kara ōyō made = Personal authentication : principles, technologies and applications. Tōkyō: Denshi Jōhō Tsūshin Gakkai, 2010.
Знайти повний текст джерелаSánchez Moltó, Manuel Vicente, writer of introduction, ed. La partida de bautismo de Miguel de Cervantes y sus detractores. Alcalá de Henares: Universidad de Alcalá, 2015.
Знайти повний текст джерелаPersonal authentication using verified electronic document. European Scientific e-Journal, 2017. http://dx.doi.org/10.47451/inn2020-09-001.
Повний текст джерелаEntity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.
Знайти повний текст джерелаKoien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.
Знайти повний текст джерелаKoien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.
Знайти повний текст джерелаEntity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.
Знайти повний текст джерелаKoien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.
Знайти повний текст джерелаHolt, Else K. The Prophet as Persona. Edited by Carolyn J. Sharp. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199859559.013.17.
Повний текст джерелаFrench, Derek, Stephen W. Mayson, and Christopher L. Ryan. 19. Acting for a company: agency and attribution. Oxford University Press, 2016. http://dx.doi.org/10.1093/he/9780198778301.003.0019.
Повний текст джерелаЧастини книг з теми "Personal Authentication"
Zhang, David D. "Personal Authentication." In Automated Biometrics, 269–88. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4519-4_13.
Повний текст джерелаLizárraga, Miguel G., and Lee L. Ling. "Biometric Personal Authentication Based on Handwritten Signals." In Biometric Authentication, 533–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_73.
Повний текст джерелаJain, Anil K., Sarat C. Dass, and Karthik Nandakumar. "Soft Biometric Traits for Personal Recognition Systems." In Biometric Authentication, 731–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_99.
Повний текст джерелаPoon, Carmen, David C. M. Wong, and Helen C. Shen. "Personal Identification and Verification: Fusion of Palmprint Representations." In Biometric Authentication, 782–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_106.
Повний текст джерелаLi, Qiang, Zhengding Qiu, Dongmei Sun, and Jie Wu. "Personal Identification Using Knuckleprint." In Advances in Biometric Person Authentication, 680–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_78.
Повний текст джерелаZhao, Weinan, Wenxin Li, Tao Wang, and Zhuoqun Xu. "A Palmprint Acquisition Device with Time-Sharing Light Source Used in Personal Verification." In Biometric Authentication, 768–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_104.
Повний текст джерелаYou, Jane, Wai-Kin Kong, David Zhang, and King Hong Cheung. "A New Approach to Personal Identification in Large Databases by Hierarchical Palmprint Coding with Multi-features." In Biometric Authentication, 739–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_100.
Повний текст джерелаKhan, Muhammad Khurram, Jiashu Zhang, and Lei Tian. "Protecting Biometric Data for Personal Identification." In Advances in Biometric Person Authentication, 629–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_72.
Повний текст джерелаYuan, Li, Zhichun Mu, and Zhengguang Xu. "Using Ear Biometrics for Personal Recognition." In Advances in Biometric Person Authentication, 221–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947_28.
Повний текст джерелаHe, Yuqing, Yangsheng Wang, and Tieniu Tan. "Iris Image Capture System Design for Personal Identification." In Advances in Biometric Person Authentication, 539–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_61.
Повний текст джерелаТези доповідей конференцій з теми "Personal Authentication"
Boechat, Glaucya C., Jeneffer C. Ferreira, and Edson C. B. Carvalho Filho. "Authentication personal." In 2007 International Conference on Intelligent and Advanced Systems (ICIAS). IEEE, 2007. http://dx.doi.org/10.1109/icias.2007.4658385.
Повний текст джерелаAyeswarya, S., and Jasmine Norman. "Seamless Personal Authentication using Biometrics." In 2019 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2019. http://dx.doi.org/10.1109/i-pact44901.2019.8960070.
Повний текст джерелаAghili, Bahareh, and Hamed Sadjedi. "Personal Authentication Using Hand Geometry." In 2009 International Conference on Computational Intelligence and Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/cise.2009.5363947.
Повний текст джерелаUesugi, Yuta, Takako Nonaka, and Tomohiro Hase. "AV control with personal authentication." In 2010 IEEE 14th International Symposium on Consumer Electronics - (ISCE 2010). IEEE, 2010. http://dx.doi.org/10.1109/isce.2010.5523717.
Повний текст джерелаLin, Hung-Yu, and Lein Harn. "Authentication protocols for personal communication systems." In the conference. New York, New York, USA: ACM Press, 1995. http://dx.doi.org/10.1145/217382.217456.
Повний текст джерелаRabkin, Ariel. "Personal knowledge questions for fallback authentication." In the 4th symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1408664.1408667.
Повний текст джерелаKumar, Ajay, and K. Venkata Prathyusha. "Personal authentication using hand vein triangulation." In SPIE Defense and Security Symposium, edited by B. V. K. Vijaya Kumar, Salil Prabhakar, and Arun A. Ross. SPIE, 2008. http://dx.doi.org/10.1117/12.779159.
Повний текст джерелаKao, Yung-Wei, Hui-Zhen Gu, and Shyan-Ming Yuan. "Personal Based Authentication by Face Recognition." In 2008 Fourth International Conference on Networked Computing and Advanced Information Management (NCM). IEEE, 2008. http://dx.doi.org/10.1109/ncm.2008.167.
Повний текст джерелаHayashi, Hitoshi. "Personal authentication using spatial and temporal information reading the personal data." In 2009 IEEE 13th International Symposium on Consumer Electronics. IEEE, 2009. http://dx.doi.org/10.1109/isce.2009.5156940.
Повний текст джерелаTao, Qian, and Raymond N. J. Veldhuis. "Biometric Authentication for a Mobile Personal Device." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340409.
Повний текст джерела