Essays about: "hand authentication"

Showing result 11 - 15 of 15 essays containing the words hand authentication.

  1. 11. Biometrics Technology : Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Irfan Iqbal; Bilal Qadir; [2012]
    Keywords : Biometrics Technology; Attitudes influencing factors; Blekinge healthcare;

    Abstract : Context. Biometric technology is a secure and convenient identification method and it does not need to remember complex passwords, nor smart cards, keys, and the like. Biometrics is the measurable characteristics of individuals based on their behavioral patterns or physiological features that can be used to verify or recognize their identity. READ MORE

  2. 12. An extension to the Android access control framework

    University essay from RISE./SICS

    Author : Qing Huang; [2011]
    Keywords : Android; access controls; security;

    Abstract : Several nice hardware functionalities located at the low level of operating system on mobile phones could be utilized in a better way if they are available to application developers. With their help, developers are able to bring overall user experience to a new level in terms of developing novel applications. READ MORE

  3. 13. An extension to the Android access control framework

    University essay from Institutionen för datavetenskap

    Author : Qing Huang; [2011]
    Keywords : Android security; access control;

    Abstract : Several nice hardware functionalities located at the low level of operating system onmobile phones could be utilized in a better way if they are available to applicationdevelopers. With their help, developers are able to bring overall user experienceto a new level in terms of developing novel applications. READ MORE

  4. 14.  A secure mobile phone-based interactive logon in Windows

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Oleksandr Bodriagov; [2010]
    Keywords : ;

    Abstract : Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. READ MORE

  5. 15. Identity Verification using Keyboard Statistics.

    University essay from Institutionen för systemteknik

    Author : Piotr Mroczkowski; [2004]
    Keywords : Informationsteknik; biometrics; identity verification; keyboard statistics; keystroke dynamics; Informationsteknik;

    Abstract : In the age of a networking revolution, when the Internet has changed not only the way we see computing, but also the whole society, we constantly face new challenges in the area of user verification. It is often the case that the login-id password pair does not provide a sufficient level of security. READ MORE