Biometrics for enterprise security

M Crosbie - Network Security, 2005 - Elsevier
'You can't leave your finger behind,'as biometrics fans never tire of telling us. In fact
biometrics have been promoted as a 'foolproof'way to authenticate an individual's identity …

[PDF][PDF] Transparent handwriting verification for mobile devices

NL Clarke, AR Mekala - Proceedings of the Sixth International Network …, 2006 - Citeseer
The popularity of mobile devices and the evolving nature of the services and information
they can delivery make them increasingly desirable targets for misuse. The ability to provide …

Biometric authentication and authorisation infrastructures

M Olden - 2010 - epub.uni-regensburg.de
Nowadays, replacing traditional authentication methods with authentication and
authorization infrastructures (AAIs) comes down to trading several passwords for one master …

Privacy enhancements for inexact biometric templates

N Ratha, S Chikkerur, J Connell, R Bolle - Security with Noisy Data: On …, 2007 - Springer
Traditional authentication schemes utilize tokens or depend on some secret knowledge
possessed by the user for verifying his or her identity. Although these techniques are widely …

Soft biometric traits for continuous user authentication

K Niinuma, U Park, AK Jain - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …

Bluepass: A secure hand-free password manager

Y Li, H Wang, K Sun - Security and Privacy in Communication Networks …, 2018 - Springer
With the growing number of online accounts a user possesses, managing passwords has
been unprecedentedly challenging. Users are prone to sacrifice security for usability …

Biometric perils and patches

RM Bolle, JH Connell, NK Ratha - Pattern recognition, 2002 - Elsevier
Biometrics authentication offers many advantages over conventional authentication systems
that rely on possessions or special knowledge. With conventional technology, often the mere …

Biometric authentication on a mobile device: a study of user effort, error and task disruption

S Trewin, C Swart, L Koved, J Martino, K Singh… - Proceedings of the 28th …, 2012 - dl.acm.org
We examine three biometric authentication modalities--voice, face and gesture--as well as
password entry, on a mobile device, to explore the relative demands on user time, effort …

Biometrics data security techniques for portable mobile devices

S Roy, S Matloob, A Seetharam, A Rameshbabu… - Inae Letters, 2017 - Springer
In this work, a specific case-study of the development of a biometric authentication system
for mobile clients (iPads) has been reported. The case-study addresses specific questions …

[PDF][PDF] Application-specific biometric templates

M Braithwaite, UC von Seelen, J Cambier… - IEEE Workshop on …, 2002 - researchgate.net
Biometric technologies that are capable of identifying individuals through one-to-many
matching across large shared databases can provide convenient authentication services for …