Sign Up to like & get
recommendations!
0
Published in 2020 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"
DOI: 10.1002/widm.1365
Abstract: The shortcomings of conventional access control systems for highâsecurity environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session,…
read more here.
Keywords:
biometrics advanced;
continuous authentication;
biometrics;
using biometrics ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Journal of AOAC International"
DOI: 10.1093/jaoacint/qsad023
Abstract: Sample authentication using one-class modeling is simpler and more versatile than the approved AOAC Probability of Identification (POI) method. This approach develops a one-class model for authentic samples and does not identify or model non-authentic…
read more here.
Keywords:
using one;
authentication using;
class modeling;
class ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2024.3450692
Abstract: Presently, the prevalent authentication approaches in smartphones are susceptible to interference from light, noise, temperature, and the risk of replay attacks. In the light of these vulnerabilities, and taking into account user behavior alongside smartphone…
read more here.
Keywords:
acoustic signals;
authentication;
adeas authentication;
authentication using ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2021.3137474
Abstract: In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition. However, fingerprint authentication cannot be used when hands are wet, and face recognition cannot…
read more here.
Keywords:
authentication;
authentication using;
personal ear;
ear authentication ... See more keywords