Results 1 - 10
of
409
A NOTE ON BIOMETRICS-BASED AUTHENTICATION WITH PORTABLE DEVICE
"... Abstract: Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing ..."
Abstract
- Add to MetaCart
Abstract: Individual authentication technologies are essential for electronic systems as social infrastructures. Especially, biometrics-based authentication has been receiving increasing attention and is expected to be implemented on systems with portable devices such as mobile phones for realizing
Authentication
, 2014
"... The primary goal of the project is to design and implement a secure and usable gesture-based authentication mechanism. This entails carefully studying the biometric data in question and applying efficient classification algorithms to achieve reliable performance. The project’s origi-nal extent was t ..."
Abstract
- Add to MetaCart
was to implement host-based authentication on the server and have individual devices communicate with it. As an optional extension, a standalone mobile authentication system was considered if development of a networked scheme proceeded well. Work Completed All major objectives have been met successfully. I
Progressive authentication: deciding when to authenticate on mobile phones
- In Proceedings of 21st USENIX Security Symposium
, 2012
"... Mobile users are often faced with a trade-off between security and convenience. Either users do not use any security lock and risk compromising their data, or they use security locks but then have to inconveniently authenticate every time they use the device. Rather than exploring a new authenticati ..."
Abstract
-
Cited by 25 (0 self)
- Add to MetaCart
Mobile users are often faced with a trade-off between security and convenience. Either users do not use any security lock and risk compromising their data, or they use security locks but then have to inconveniently authenticate every time they use the device. Rather than exploring a new
Biometric Based Secured Authentication in Mobile Web Services
"... Abstract — Web service is a responsible for the machines to communicate with each other in World Wide Web. Most of the Web services in real world application developed were to work on PC Platforms, not in mobile. Web services developed on Mobile platforms have to overcome the challenges in this plat ..."
Abstract
- Add to MetaCart
in this platform. Mobile based web services provide interoperability. In today’s development of technology, Hand held devices are ruling the world, so there is a need of mobile based services. The security in terms of mobile phones is the issue due to misplacement of the device or in terms of theft. Web services
Biometric authentication for mobile personal device
- In First International Workshop on Personalized Networks
, 2006
"... Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face-auth ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face-authentication
Pages 21-30 Face Verification Schemes for Mobile Personal devices
, 2005
"... Abstract: The fast growing public ownership and use of mobile personal programmable communication devices (e.g. PDA’s) create new and exciting opportunities for convenient and secure commercial and service providing transactions. The newer generations of these devices incorporate digital cameras and ..."
Abstract
- Add to MetaCart
and signature pads, raising the possibility of enhancing the security of mobile transactions using biometric-based authentication. However, implementing biometrics-based athentication on devices that are constrained in their memory size and computational power is a tough technological task. This paper
Your Song Your Way: Rhythm-Based Two-Factor Authentication for Multi-Touch Mobile Devices
"... Abstract—Multi-touch mobile devices have penetrated into everyday life to support personal and business communications. Secure and usable authentication techniques are indispensable for preventing illegitimate access to mobile devices. This paper presents RhyAuth, a novel two-factor rhythm-based aut ..."
Abstract
- Add to MetaCart
Abstract—Multi-touch mobile devices have penetrated into everyday life to support personal and business communications. Secure and usable authentication techniques are indispensable for preventing illegitimate access to mobile devices. This paper presents RhyAuth, a novel two-factor rhythm-based
Biometric Template Protection for Dynamic Time Warping-based User Authentication
"... Abstract — A DTW-based biometric user authentication system needs a DTW template to set up a warping function for a query biometric. In addition, a matching template is required to examine similarity. In this paper, we present a hardened template to protect the DTW template. For the matching templat ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract — A DTW-based biometric user authentication system needs a DTW template to set up a warping function for a query biometric. In addition, a matching template is required to examine similarity. In this paper, we present a hardened template to protect the DTW template. For the matching
USER AUTHENTICATION SCHEMES FOR MOBILE AND HANDHELD DEVICES
, 2007
"... Abstract. User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary lin ..."
Abstract
- Add to MetaCart
schemes based on graphical assistance, images and audio. In this paper, we conduct a comprehensive survey and analysis of such existing user authentication schemes for mobile and handheld devices. The complete analysis of these schemes in term of usability and security are also discussed in this paper
A Survey of User Authentication Schemes for Mobile Device
"... ABSTRACT: Personal mobile devices (PMDs) have become ubiquitous technology. There, steadily increasing computational and storage capabilities have enabled them to over an increasingly large set of services. Mobile devices offer their users lots of possibilities and a feeling of freedom. However, thi ..."
Abstract
- Add to MetaCart
. Unfortunately, a less effective and inconvenient PIN based authentication system is used to protect them against their misuse. So far authentication mechanisms like PINs and passwords do not take into account the limited capabilities of user interfaces of mobile devices. So, it is necessary to create
Results 1 - 10
of
409