[go: up one dir, main page]

Clarke, 2011 - Google Patents

Intrusive Authentication Approaches

Clarke, 2011

Document ID
1457441144722709302
Author
Clarke N
Publication year
Publication venue
Transparent User Authentication: Biometrics, RFID and Behavioural Profiling

External Links

Snippet

Authentication has been at the cornerstone of information security since the inception of information technology (IT). Whilst the foundations upon which they rely have changed little, technology has evolved and adapted these approaches to fit a variety of solutions. Prior to …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Rui et al. A survey on biometric authentication: Toward secure and privacy-preserving identification
Dasgupta et al. Advances in user authentication
Clarke Transparent user authentication: biometrics, RFID and behavioural profiling
Lovisotto et al. Mobile biometrics in financial services: A five factor framework
Yusuf et al. A survey of biometric approaches of authentication
Lone et al. A novel OTP based tripartite authentication scheme
Wells et al. Privacy and biometrics for smart healthcare systems: attacks, and techniques
Tiwari et al. Emerging biometric modalities and integration challenges
Bock Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Mohamed Security of multifactor authentication model to improve authentication systems
Smith-Creasey Continuous biometric authentication systems
Dasgupta et al. Biometric Authentication: Authentication through human characteristics
Kannavara et al. Topics in biometric human-machine interaction security
Sabater Biometrics as password alternative
Wilusz et al. Security analysis of transaction authorization methods for next generation electronic payment services
Al Abdulwahid Federated authentication using the cloud (Cloud Aura)
Clarke Intrusive Authentication Approaches
Hussain et al. BSC: A Novel Scheme for Providing Security using Biometric Smart Card
Furnell Biometric technology and user identity
Cimato et al. Biometrics and privacy
Lott et al. Improving customer authentication
Thakur Biometric Authentication System: Techniques and Future
Alston A New Era in Cybersecurity Through Biometric Technology
Smith-Creasey Traditional Authentication
Ibibo ATTACKS AGAINST BIOMETRIC AUTHENTICATION IOT SYSTEM: A REVIEW, TAXONOMY AND OPEN CHALLENGES