Advanced search
Showing result 1 - 5 of 60 essays matching the above criteria.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Lost in the Metaverse - Navigating Privacy Challenges in the Jurisdiction of Virtual Worlds
University essay from Göteborgs universitet/Juridiska institutionenAbstract : The Metaverse consists of a set of emerging technologies that could be as disruptive as the internet, enabling seamless integration of our digital and physical lives. While offering a wide array of exciting application areas, the technologies also allow for intrusions on our privacy at a higher level than has ever been possible. READ MORE
-
3. How do voiceprints age?
University essay from Uppsala universitet/Institutionen för lingvistik och filologiAbstract : Voiceprints, like fingerprints, are a biometric. Where fingerprints record a person's unique pattern on their finger, voiceprints record what a person's voice "sounds like", abstracting away from what the person said. They have been used in speaker recognition, including verification and identification. READ MORE
-
4. Comparative Analysis of Machine Learning Algorithms for Biometric Iris Recognition Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Biometric identification plays a crucial role in various industries such as retail, and banking. Among the different biometric traits, iris patterns have become a reliable means of identification due to their unique features. In our thesis, we focus on evaluating and comparing different machine learning algorithms for irisrecognition. READ MORE
-
5. Privacy Preserving Biometric Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE