Results 1 - 10
of
353
Privacy and Usability of Image and Text Based Challenge Questions Authentication in Online Examination
"... Abstract — In many online examinations, physical invigilation is often replaced with traditional authentication approaches for student identification. Secure and usable authentication approaches are important for high stake online examinations. A Profile Based Authentication Framework (PBAF) was dev ..."
Abstract
- Add to MetaCart
were reported to be too many and caused distraction. Participants expressed a degree of concern on sharing personal and academic information with little or no privacy concern on using favorite questions. Keywords—Online examination, profile, challenge questions, authentication, security, usability
Loud and clear: Human-verifiable authentication based on audio
- In ICDCS ’06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, 2006
"... Authentication of communication channels between devices that lack any previous association is an challenging problem. It has been considered in many contexts and in various flavors, most recently, by McCune et al., where human-assisted device authentication is achieved through the use of photo came ..."
Abstract
-
Cited by 118 (6 self)
- Add to MetaCart
be in the authentication pipeline of a vision-based system), and (3) some usage scenarios preclude either taking a sufficiently clear picture and/or the use of barcodes. We develop and evaluate a system we call Loud-and-Clear (L&C) authentication, which, like Seeing-is-Believing, places little demand on the human user
1 Audio Voice Authentication
"... Abstract — In this present day of vast technological advances that demand the highest security possible to protect legitimate users and their data from impostors, current security technologies may not prove to be sufficient. The current, widely used authentication schemes are based upon the establis ..."
Abstract
- Add to MetaCart
or entirely certify the user’s claim of identity is becoming progressively more attractive since it establishes one’s identity based on “who he is”. Among the various forms of biometrics for use as a form of security is voice biometrics – the use of a person’s voice to certify they are who they claim to be
Biometrics: A tool for information security
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
, 2006
"... Establishing identity is becoming critical in our vastly interconnected society. Questions such as “Is she really who she claims to be?, ” “Is this person authorized to use this facility?, ” or “Is he in the watchlist posted by the government? ” are routinely being posed in a variety of scenarios r ..."
Abstract
-
Cited by 182 (4 self)
- Add to MetaCart
of recognizing an individual based on his or her physical or behavioral traits, is beginning to gain acceptance as a legitimate method for determining an individual’s identity. Biometric systems have now been deployed in various commercial, civilian, and forensic applications as a means of establishing identity
Q-A: Towards the Solution of Usability-Security Tension in User Authentication
"... Abstract—Users often choose passwords that are easy to remember but also easy to guess by attackers. Recent studies have revealed the vulnerability of textual passwords to shoulder surfing and keystroke loggers. It remains a critical challenge in password research to develop an authentication scheme ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
, and evaluate Q-A, a novel cognitive-question-based password system that requires a user to enter the letter at a given position in her answer for each of six personal questions (e.g. “What is the name of your favorite childhood teacher?”). In this scheme, the user does not need to memorize new, artificial
A Study of Identical Twins ’ Palmprints for Personal Authentication
"... Abstract. Biometric recognition based on human characteristics for personal identification has attracted great attention. The performance of biometric systems highly depends on the distinctive information in the biometrics. However, identical twins having the closest geneticsbased relationship are e ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
are expected to have maximum similarity between their biometrics. Classifying identical twins is a challenging problem for some automatic biometric systems. In this paper, we summarize the exiting experimental results about identical twins ’ biometrics including face, iris, fingerprint and voice verification
Designing the User Interface for Multimodal Speech and Pen-based Gesture Applications: State-of-the-Art Systems and Future Research Directions
, 2000
"... The growing interest in multimodal interface design is inspired in large part by the goals of supporting more transparent, flexible, efficient, and powerfully expressive means of humancomputer interaction than in the past. Multimodal interfaces are expected to support a wider range of diverse applic ..."
Abstract
-
Cited by 150 (15 self)
- Add to MetaCart
applications, to be usable by a broader spectrum of the average population, and to function more reliably under realistic and challenging usage conditions. In this paper, we summarize the emerging architectural approaches for interpreting speech and pen-based gestural input in a robust manner--- including
Veins based Authentication System
"... Biometric system such as finger, face, iris, ear, voice, DNA etc. is used for personal identification. Authentication based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin on back of the hand. Vein pattern are unique and also difficult to duplica ..."
Abstract
- Add to MetaCart
Biometric system such as finger, face, iris, ear, voice, DNA etc. is used for personal identification. Authentication based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin on back of the hand. Vein pattern are unique and also difficult
VOICE BASED SPEAKER IDENTIFICATION SYSTEM
"... In today’s context security is a main concern of most of the organization. Therefore for their own employee and customer they need a very reliable and robust security system which authenticates people based on a criteria which does not waste the time of people in due cause of authentication. For thi ..."
Abstract
- Add to MetaCart
In today’s context security is a main concern of most of the organization. Therefore for their own employee and customer they need a very reliable and robust security system which authenticates people based on a criteria which does not waste the time of people in due cause of authentication
Authenticated Technologies for Visually Challenged Candidates
"... The objective of the project is to bridge up the gap between normal people and blind people by the way to spread education to everyone and also giving chance to blind people to get qualified. It helps the blind people to eradicate poverty from weaker sections of society and to improve social and eco ..."
Abstract
- Add to MetaCart
with the help of his/her invigilator and a unique ID will be generated.At the examination center, he/she will enter the ID through voice commands with the help of invigilator. After entered the Id and password the exam will start by the invigilator then what ever the candidates doing in a system all
Results 1 - 10
of
353