No abstract available.
Cited By
- Gianaria E and Grangetto M (2019). Robust gait identification using Kinect dynamic skeleton data, Multimedia Tools and Applications, 78:10, (13925-13948), Online publication date: 1-May-2019.
- Salehifar H, Bayat P and Majd M (2019). Eye gesture blink password, Multimedia Tools and Applications, 78:12, (16861-16885), Online publication date: 1-Jun-2019.
- Darabseh A and Siami Namin A Keystroke Active Authentications Based on Most Frequently Used Words Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, (49-54)
- Sujithra M and Padmavathi G Next generation biometric security system Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (377-381)
- Rahaman A and Sasse M (2018). A framework for the lived experience of identity, Identity in the Information Society, 3:3, (605-638), Online publication date: 1-Dec-2010.
- Melnikov N and Schönwälder J Cybermetrics Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security, (167-170)
- Riley C, Benyon D, Johnson G and Buckner K Security in context Proceedings of the 24th BCS Interaction Specialist Group Conference, (108-116)
- Uzoka F and Ndzinge T (2009). Empirical analysis of biometric technology adoption and acceptance in Botswana, Journal of Systems and Software, 82:9, (1550-1564), Online publication date: 1-Sep-2009.
- Lu H, Claret-Tournier F, Chatwin C, Young R and Liu Z (2009). An agent-oriented mobile payment system secured using a biometrics approach, International Journal of Agent-Oriented Software Engineering, 3:2/3, (163-187), Online publication date: 1-Mar-2009.
- Kukula E, Elliott S and Duffy V The effects of human interaction on biometric system performance Proceedings of the 1st international conference on Digital human modeling, (904-914)
- Ming A and Ma H Proposal of an architecture for a biometrics grid Proceedings of the 10th international conference on Business information systems, (195-208)
- Ming A and Ma H An algorithm testbed for the biometrics grid Proceedings of the 2nd international conference on Advances in grid and pervasive computing, (447-458)
- Gunetti D, Picardi C and Ruffo G Keystroke analysis of different languages Proceedings of the 6th international conference on Advances in Intelligent Data Analysis, (133-144)
- Gunetti D, Picardi C and Ruffo G Dealing with different languages and old profiles in keystroke analysis of free text Proceedings of the 9th conference on Advances in Artificial Intelligence, (347-358)
- Joung B and Lee W On optimizing feature vectors from efficient iris region normalization for a ubiquitous computing Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (1196-1203)
- Joung B, Chung C, Lee K, Yim W and Lee S On improvement for normalizing iris region for a ubiquitous computing Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (1213-1219)
- Coventry L, De Angeli A and Johnson G Usability and biometric verification at the ATM interface Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (153-160)
- De Angeli A, Coutts M, Coventry L, Johnson G, Cameron D and Fischer M VIP Proceedings of the Working Conference on Advanced Visual Interfaces, (316-323)
Index Terms
- Biometrics: advanced identity verification
Recommendations
Multi-factor biometrics for authentication: a false sense of security
MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and securityMulti-factor biometric authentications have been proposed recently to strengthen security and/or privacy of biometric systems in addition to enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply ...
Finger knuckle biometrics - A review
Display Omitted Describes the role of finger knuckle surface in biometric authentication.Enumerates various available open datasets for finger knuckle biometric trait.Presents different view point in the classification of various finger knuckle feature ...
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from ...