Essays about: "Biometric Authentication"

Showing result 1 - 5 of 33 essays containing the words Biometric Authentication.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Privacy Preserving Biometric Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Emil Gedenryd; [2023]
    Keywords : Fully Homomorphic Encryption; Machine Learning; Biometric Authentication; Technology and Engineering;

    Abstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE

  3. 3. Acceptance of Biometric Systemsfor User Authentication and Identification

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Mymoon Dobaibi; [2023]
    Keywords : Biometrics Acceptance; Authentication Techniques; User Preferences; Preferred Techniques; User Experiences; User Perception.;

    Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE

  4. 4. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Herman Blenneros; Erik Sävenäs; [2021]
    Keywords : Continuous Authentication; Generative Adversarial Network; evasion; biometrics;

    Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE

  5. 5. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor

    University essay from

    Author : Robert Danilovic; Måns Svensson; [2021]
    Keywords : Keystroke dynamics; Password security; Artificial Intelligence; Mobile application; Neural network; SVM; Gyroscope; Typing Characteristics;

    Abstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE