Now showing items 11-20 of 159
Token-Based Authentication Techniques on Open Source Cloud Platforms
(Universidad IcesiFacultad de IngenieríaIngeniería TelemáticaTecnologías De Información Y Comunicaciones Tic, 2018-10-01)
Cloud computing is a service-oriented computational platform that allows on-demand resource provisioning for low-cost application deployment. However, security and privacy of the users is a major concern for the cloud ...
Um método para autenticação multifator baseado em biometria, interferência de onda e mapas caóticos
(BrasilUFRNPROGRAMA DE PÓS-GRADUAÇÃO EM ENGENHARIA ELÉTRICA E DE COMPUTAÇÃO, 2017-06-28)
The democratization of Internet access has allowed more and more companies to digitize their services. As new services are offered on the network, there is growing concern about the possibility of undue access to sensitive ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Ridge-based fingerprint matching using hough transform
(Institute of Electrical and Electronics Engineers (IEEE), Computer Soc, 2014)