Search results for "User authentication"

showing 3 items of 3 documents

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Fingerprint and Iris based Authentication in Intercooperative Emerging e-Infrastructures

2013

E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fi…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniUser authenticationAuthenticationBiometricsComputer sciencebusiness.industryFingerprint (computing)Context (language use)Biometric Authentication Systems Unimodal and Multimodal Systems Embedded SensorsSoftwareHuman–computer interactionAuthentication protocolEmbedded systemLightweight Extensible Authentication Protocolbusiness
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct