Now showing items 1-10 of 159
A video-based biometric authentication for e-learning web applications
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
(MDPI AG, 2019)
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by ...
Usability Assessment In A Multi-biometric Continuous Authentication System
(IEEENew York, 2016)
User authentication through typing biometrics features
(Ieee-inst Electrical Electronics Engineers IncPiscatawayEUA, 2005)
Protecting Touch: Authenticated App-To-Server channels for mobile devices using NFC tags
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range ...
Ridge-based fingerprint matching using hough transform
(Institute of Electrical and Electronics Engineers (IEEE), Computer Soc, 2005-12-01)
Despite the efficacy of minutia-based fingerprint matching techniques for good-quality images captured by optical sensors, minutia-based techniques do not often perform so well on poor-quality images or fingerprint images ...
Providing Integrity and Authenticity in DICOM Images: A Novel Approach
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2009)
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may ...
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks
(Oxford Univ PressOxfordInglaterra, 2012)
Authenticity and versioning of learning objects using the digital signature infrastructure of Costa Rica
(LACLO 2016, 2016)
There are a large number of educational resources available on the Internet through different repositories. However, authenticity methods of learning objects has not been widely adopted by repositories, making it difficult ...