Sign Up to like & get
recommendations!
0
Published in 2020 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"
DOI: 10.1002/widm.1365
Abstract: The shortcomings of conventional access control systems for highâsecurity environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session,…
read more here.
Keywords:
biometrics advanced;
continuous authentication;
biometrics;
using biometrics ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Journal of AOAC International"
DOI: 10.1093/jaoacint/qsad023
Abstract: Sample authentication using one-class modeling is simpler and more versatile than the approved AOAC Probability of Identification (POI) method. This approach develops a one-class model for authentic samples and does not identify or model non-authentic…
read more here.
Keywords:
using one;
authentication using;
class modeling;
class ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2021.3137474
Abstract: In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition. However, fingerprint authentication cannot be used when hands are wet, and face recognition cannot…
read more here.
Keywords:
authentication;
authentication using;
personal ear;
ear authentication ... See more keywords