Buscar
Mostrando ítems 1-10 de 728
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
(MDPI AG, 2019)
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by ...
Designing a complementary system of authentication base on galvanic body communication
(Institute of Electrical and Electronics Engineers Inc., 2017)
This article deals with the design, development and operation of security applications oriented in bodycommunication, along with analysis, evaluation and design of a complementary system of user authentication through ...
TV program recommender using user authentication on middleware ginga
(Institute of Electrical and Electronics Engineers Inc., 2018)
The system proposed in this article aims to identify and recognize television users with the objective of offering personalized television programming. In this setting, the authentication and recommendation mechanisms used ...
Authentication in mobile cloud computing by combining the tow factor Authentication and one time password token
(Universidade Federal de Santa Maria, 2015)
Usability Assessment In A Multi-biometric Continuous Authentication System
(IEEENew York, 2016)
SECURITY ENHANCEMENT ON LI-LEE’S REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
(Computación y sistemas, 2017)
Protecting Touch: Authenticated App-To-Server channels for mobile devices using NFC tags
(2017-07-06)
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range ...