Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
biometric techniques
biblio
Smart Cards with Biometric Influences: An Enhanced ID Authentication
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
biometrics integration
smartcards
smart cards
Smart card
Processing time
privacy concerns
possible biometric solution
identity authentication
human interfaces
human beings
highly reliable support system
FRR
FAR
enhanced ID authentication
DNA technology
DNA
Cryptography
biometric technologies
biometric techniques
biometric key considerations
biometric influences
biometric encryption
biometrics
biometric technology
resilience
biometrics (access control)
Scalability
data privacy
Resiliency
Metrics
pubcrawl
biblio
Android-Based Smartphone Authentication System Using Biometric Techniques: A Review
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
Face
android encryption
smartphone information leakage
performance index
mobile internet
identity authentication systems
encryption technology
Biometric Recognition
Android-based smartphone authentication system
Android-based biometric verification systems
Android OS accounts
android operation system
algorithmic framework
Metrics
biometric
biometric techniques
Scalability
Humanoid robots
Androids
Android (operating system)
Information Assurance
biometrics (access control)
authentication
smart phones
pubcrawl
Human behavior
Resiliency
feature extraction
Support vector machines
mobile computing
Cryptography
authorisation
biblio
Symmetric-Key Multi-Factor Biometric Authentication Scheme
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
multi-factor
symmetric-key multifactor biometric authentication scheme
smart-card
Silicon
Servers
security attacks
Resiliency
pubcrawl
ProVerif
ProVeri
private key cryptography
password
multifactor authentication
authentication
Metrics
identity password
Human Factors
Germanium
Cryptography
Cao and Ge's scheme
Burrows-Abadi-Needham (BAN) logic
biometrics (access control)
biometric techniques
biometric
authorisation