0000000000322318

AUTHOR

S. Vitabile

Usability analysis of a novel biometric authentication approach for android-based mobile devices

Mobile devices are widely replacing the standard personal computers thanks to their small size and user-friendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine int…

research product

Resource-efficient hardware implementation of a neural-based node for automatic fingerprint classification

Modern mobile communication networks and Internet of Things are paving the way to ubiquitous and mobile computing. On the other hand, several new computing paradigms, such as edge computing, demand for high computational capabilities on specific network nodes. Ubiquitous environments require a large number of distributed user identification nodes enabling a secure platform for resources, services and information management. Biometric systems represent a useful option to the typical identification systems. An accurate automatic fingerprint classification module provides a valuable indexing scheme that allows for effective matching in large fingerprint databases. In this work, an efficient em…

research product

Biometric Features for Mobile Agents Ownership

Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …

research product

An Automatic Method for PET Delineation of Cervical Tumors

Aim: PET imaging is increasingly utilized for radiation treatment planning. Nevertheless, accurate segmentation of PET images is a complex and unresolved problem. Aim of this work is the development of an automatic segmentation method of Biological Target Volume (BTV) in patients with cervical cancer. Materials and methods: Random walks (RW) is a graph-based method that represents a DICOM (Digital Imaging and COmmunications in Medicine) image as a graph. The voxels are its nodes and the edges are defined by a cost function which maps a change in image intensity to edge weights. Then, RW partitions the nodes into target and background subsets. To create an automatic method starting from prev…

research product

Message from BWCCA 2012 international conference workshop co-chairs

research product

Proceedings - 2014 IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, MCSoC 2014

research product