Advanced search

Showing result 1 - 5 of 60 essays matching the above criteria.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Lost in the Metaverse - Navigating Privacy Challenges in the Jurisdiction of Virtual Worlds

    University essay from Göteborgs universitet/Juridiska institutionen

    Author : Adeline Fredriksson; [2023-08-11]
    Keywords : Metaverse; Human rights; Privacy; Jurisdiction;

    Abstract : The Metaverse consists of a set of emerging technologies that could be as disruptive as the internet, enabling seamless integration of our digital and physical lives. While offering a wide array of exciting application areas, the technologies also allow for intrusions on our privacy at a higher level than has ever been possible. READ MORE

  3. 3. How do voiceprints age?

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Maya Konstantinovna Nachesa; [2023]
    Keywords : Voiceprint; Speaker Emotion Recognition; Age; Speaker Verification;

    Abstract : Voiceprints, like fingerprints, are a biometric. Where fingerprints record a person's unique pattern on their finger, voiceprints record what a person's voice "sounds like", abstracting away from what the person said. They have been used in speaker recognition, including verification and identification. READ MORE

  4. 4. Comparative Analysis of Machine Learning Algorithms for Biometric Iris Recognition Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Vishnu Kiran Dabbara; Neeraj Bala; [2023]
    Keywords : Computing Methodologies; Machine Learning; Neural Networks; Feature Extraction; Biometrics;

    Abstract : Background: Biometric identification plays a crucial role in various industries such as retail, and banking. Among the different biometric traits, iris patterns have become a reliable means of identification due to their unique features. In our thesis, we focus on evaluating and comparing different machine learning algorithms for irisrecognition. READ MORE

  5. 5. Privacy Preserving Biometric Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Emil Gedenryd; [2023]
    Keywords : Fully Homomorphic Encryption; Machine Learning; Biometric Authentication; Technology and Engineering;

    Abstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE