Finger surface as a biometric identifier

DL Woodard, PJ Flynn - Computer vision and image understanding, 2005 - Elsevier
We present a novel approach for personal identification and identity verification which
utilizes 3D finger surface features as a biometric identifier. Using 3D range images of the …

Cost and benefit analysis of authentication systems

K Altinkemer, T Wang - Decision Support Systems, 2011 - Elsevier
This study investigates the key elements an online service or product provider needs to
consider when adopting another single-factor or two-factor authentication system. We also …

A visuo-biometric authentication mechanism for older users

K Renaud - People and Computers XIX—The Bigger Picture …, 2006 - Springer
The Web is an invaluable resource for users of all ages, but it especially offers facilities
which can make a huge difference to the lives of elderly users, many of whom have to …

[PDF][PDF] Gait analysis: Is it easy to learn to walk like someone else?

Ø Stang - 2007 - ntnuopen.ntnu.no
ENGELSK: In this master's thesis, we will look at whether it is easy or difficult to learn to walk
like someone else in such a way that one will be accepted by an authentication system …

A process for supporting risk-aware web authentication mechanism choice

K Renaud - Reliability Engineering & System Safety, 2007 - Elsevier
Web authentication is often treated as a one-size-fits-all problem with ubiquitous use of the
password. Indeed, authentication is seldom tailored to the needs of either the site or the …

Exploiting finger surface as a biometric identifier.

DL Woodard - 2004 - elibrary.ru
Biometrics, the discipline of establishing an individual''s identity based upon physical or
behavioral characteristics, has become of major research area due to the numerous …

Security issues and solutions in distributed heterogeneous mobile database systems.

AR Hurson, JA Ploskonka, Y Jiao, H Haridas - Adv. Comput., 2004 - books.google.com
Security continues to be a fundamental requirement of modern computer systems. As more
information is stored electronically, users become more concerned with the security of their …

[PDF][PDF] Security and usability assessment of several authentication technologies

RS Sollie - 2005 - ntnuopen.ntnu.no
ENGELSK: In todays modern society, users have certain requirements to technology. They
want to be able to access systems and perform tasks regardless of time and location. The …

Towards information technology security for universal access

S Cohen, N Ben-Asher, J Meyer - … Computer Interaction. Design for All and …, 2011 - Springer
One way to secure Information Technology (IT) systems is with authentication mechanisms
that distinguish between users. Users who differ in their cognitive and motor abilities, cultural …

[PDF][PDF] Adopting biometrics: Factors that influence decision-making managers

S Cole - Unpublished Doctoral dissertation, University of Fairfax …, 2008 - researchgate.net
Technological innovations continue to be developed at a rapid rate. This trend shows no
sign of slowing down, but rather accelerating. As technological innovations are developed …