T Limpanuparb - NECTEC Technical Journal, 2004 - thaiscience.info
At present computer security is increasingly important as global access to information and resources becomes an integral part of many aspects of our lives. Reliable methods for user …
Ò Coltell, JM Badfa, G Torres - Proceedings IEEE 33rd Annual …, 1999 - ieeexplore.ieee.org
We have revised several authentication systems based on biometric technology to resume advantages and disadvantages. Because pure hardware biometric systems of user …
O Alpar, O Krejcar - Advances in Artificial Intelligence: From Theory to …, 2017 - Springer
Biometric keystroke authentication methods deal with extracting the key-press times to validate the users considering the uniqueness of password entering style. When the …
P Bours, H Barghouthi - The Norwegian Information Security …, 2009 - academia.edu
When talking about authentication in general and biometrics in particular, we envisage a situation where a user provides an identity and gives proof of this identity, in order to get …
M Rogowski, K Saeed - Biometrics and Kansei Engineering, 2012 - Springer
The focus of this chapter is on security of touch screen devices. The emphasis is placed on smartphones–such as Apple iPhone and Android phones–and tablets–such as Apple iPad …
M El-Abed, C Charrier - New Trends and Developments in Biometrics, 2012 - hal.science
Biometrics is considered as a promising solution among traditional methods based on" what we own"(such as a key) or" what we know"(such as a password). It is based on" what we …
O Alpar, O Krejcar - Advances in Artificial Intelligence: From Theory to …, 2017 - Springer
Biometric keystroke term basically represents the classification of the users based on password entering style. The characteristic feature to be extracted in most keystroke …
In this paper we give a survey of biometrical applications in security context. We start with a brief overview of the different biometric modalities which are most frequently used and …
K Halunen, V Vallivaara - Secure IT Systems: 21st Nordic Conference …, 2016 - Springer
User authentication is a key technology in human machine interaction. The need to establish the legitimacy of transactions and possibly the actors behind them is crucial for trustworthy …