Essays about: "Biometric Authentication"
Showing result 1 - 5 of 33 essays containing the words Biometric Authentication.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Privacy Preserving Biometric Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE
-
3. Acceptance of Biometric Systemsfor User Authentication and Identification
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE
-
4. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE
-
5. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor
University essay fromAbstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE