Clarke, 2011 - Google Patents
Intrusive Authentication ApproachesClarke, 2011
- Document ID
- 1457441144722709302
- Author
- Clarke N
- Publication year
- Publication venue
- Transparent User Authentication: Biometrics, RFID and Behavioural Profiling
External Links
Snippet
Authentication has been at the cornerstone of information security since the inception of information technology (IT). Whilst the foundations upon which they rely have changed little, technology has evolved and adapted these approaches to fit a variety of solutions. Prior to …
- 238000005516 engineering process 0 abstract description 23
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rui et al. | A survey on biometric authentication: Toward secure and privacy-preserving identification | |
Dasgupta et al. | Advances in user authentication | |
Clarke | Transparent user authentication: biometrics, RFID and behavioural profiling | |
Lovisotto et al. | Mobile biometrics in financial services: A five factor framework | |
Yusuf et al. | A survey of biometric approaches of authentication | |
Lone et al. | A novel OTP based tripartite authentication scheme | |
Wells et al. | Privacy and biometrics for smart healthcare systems: attacks, and techniques | |
Tiwari et al. | Emerging biometric modalities and integration challenges | |
Bock | Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication | |
Mohamed | Security of multifactor authentication model to improve authentication systems | |
Smith-Creasey | Continuous biometric authentication systems | |
Dasgupta et al. | Biometric Authentication: Authentication through human characteristics | |
Kannavara et al. | Topics in biometric human-machine interaction security | |
Sabater | Biometrics as password alternative | |
Wilusz et al. | Security analysis of transaction authorization methods for next generation electronic payment services | |
Al Abdulwahid | Federated authentication using the cloud (Cloud Aura) | |
Clarke | Intrusive Authentication Approaches | |
Hussain et al. | BSC: A Novel Scheme for Providing Security using Biometric Smart Card | |
Furnell | Biometric technology and user identity | |
Cimato et al. | Biometrics and privacy | |
Lott et al. | Improving customer authentication | |
Thakur | Biometric Authentication System: Techniques and Future | |
Alston | A New Era in Cybersecurity Through Biometric Technology | |
Smith-Creasey | Traditional Authentication | |
Ibibo | ATTACKS AGAINST BIOMETRIC AUTHENTICATION IOT SYSTEM: A REVIEW, TAXONOMY AND OPEN CHALLENGES |