Essays about: "security and biometrics"
Showing result 11 - 15 of 30 essays containing the words security and biometrics.
-
11. Behavioral Monitoring on Smartphones for Intrusion Detection in Web Systems : A Study of Limitations and Applications of Touchscreen Biometrics
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : Touchscreen biometrics is the process of measuring user behavior when using a touchscreen, and using this information for authentication. This thesis uses SVM and k-NN classifiers to test the applicability of touchscreen biometrics in a web environment for smartphones. READ MORE
-
12. Two-factor Authentication in Smartphones: Implementations and Attacks
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. READ MORE
-
13. Risk-Management Approaches in the Post 9/11 Era: A Case Study of Security Provisions within the Context of the US
University essay from Lunds universitet/Graduate SchoolAbstract : In the aftermath of 9/11, a heightened development of security provisions within the United States of America (US) has been observed. This thesis seeks to study how these security provisions have influenced the process of a securitization of migration and the conceptualization of migrants within the US. READ MORE
-
14. Biometrics Technology : Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : Context. Biometric technology is a secure and convenient identification method and it does not need to remember complex passwords, nor smart cards, keys, and the like. Biometrics is the measurable characteristics of individuals based on their behavioral patterns or physiological features that can be used to verify or recognize their identity. READ MORE
-
15. Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such as fingerprint, iris, voice and palm prints, etc. READ MORE