Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Biometric Recognition
biblio
Android-Based Smartphone Authentication System Using Biometric Techniques: A Review
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
Face
android encryption
smartphone information leakage
performance index
mobile internet
identity authentication systems
encryption technology
Biometric Recognition
Android-based smartphone authentication system
Android-based biometric verification systems
Android OS accounts
android operation system
algorithmic framework
Metrics
biometric
biometric techniques
Scalability
Humanoid robots
Androids
Android (operating system)
Information Assurance
biometrics (access control)
authentication
smart phones
pubcrawl
Human behavior
Resiliency
feature extraction
Support vector machines
mobile computing
Cryptography
authorisation
biblio
Palmprint recognition based on ultrasound imaging
Submitted by aekwall on Mon, 08/03/2020 - 9:16am
3D image acquisition
Acoustic Fingerprints
ultrasound system
ultrasound imaging
ultrasound images
ultrasonic imaging
ultrasonic fingerprint sensors
recognition procedure
Recognition accuracy
Image Processing
biometric recognition systems
Biometric Recognition
acoustic coupling
3D imaging
feature extraction
2D palmprint images
palmprint recognition
image sensors
fingerprint identification
Acoustics
Two dimensional displays
Three-dimensional displays
image recognition
composability
pubcrawl
Human behavior
Resiliency
biblio
Personalized authentication procedure for restricted web service access in mobile phones
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
mobile computing
web services
smart phones
Servers
security
restricted Web service access
personalized authentication procedure
performance evaluation
multilevel authentication procedure
Multi-Level Authenticatio
mobile phones
Mobile handsets
authentication
Mobile communication
malware intrusions
internet
face recognition
biometrics (access control)
biometric signature acquisition device
Biometric Recognition
biometric face recognition
biometric capture device
authorisation