Advanced search

Showing result 1 - 5 of 59 essays matching the above criteria.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Comparative Analysis of Machine Learning Algorithms for Biometric Iris Recognition Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Vishnu Kiran Dabbara; Neeraj Bala; [2023]
    Keywords : Computing Methodologies; Machine Learning; Neural Networks; Feature Extraction; Biometrics;

    Abstract : Background: Biometric identification plays a crucial role in various industries such as retail, and banking. Among the different biometric traits, iris patterns have become a reliable means of identification due to their unique features. In our thesis, we focus on evaluating and comparing different machine learning algorithms for irisrecognition. READ MORE

  3. 3. Concerns of Power and Policy in the Use of Biometrics by UNHCR

    University essay from Uppsala universitet/Teologiska institutionen

    Author : Tamara Lynn Larter; [2023]
    Keywords : biometrics; Biometric Identification Management System; BIMS; biopolitics; digital technology; humanitarian governance; refugees; UNHCR;

    Abstract : This paper investigates the growing concerns surrounding the utilisation of biometric technology within humanitarian organisations, with a specific focus on the Biometric Information Management System (BIMS) operated by UNHCR. The study is based on a literature review in which themes of concern are first identified in theoretical literature followed by an examination of empirical literature (here termed ‘refugee-including literature’) to see if the concerns are shared. READ MORE

  4. 4. Privacy Preserving Biometric Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Emil Gedenryd; [2023]
    Keywords : Fully Homomorphic Encryption; Machine Learning; Biometric Authentication; Technology and Engineering;

    Abstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE

  5. 5. Contactless palm print recognition: Novel design and palm openness classification

    University essay from Lunds universitet/Matematik LTH

    Author : Simon Mahdavi Khayavi; Leo Yi-Lei Li; [2023]
    Keywords : Mathematics and Statistics;

    Abstract : Biometric technologies, such as facial and fingerprint recognition, have become widely adopted for identity verification in various applications. Palm biometrics, utilizing the unique patterns of the human palm, has gained significant attention for its accuracy and security. READ MORE