Articles with "authentication using" as a keyword



Photo by radowanrehan from unsplash

Continuous authentication using biometrics: An advanced review

Sign Up to like & get
recommendations!
Published in 2020 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"

DOI: 10.1002/widm.1365

Abstract: The shortcomings of conventional access control systems for high‐security environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session,… read more here.

Keywords: biometrics advanced; continuous authentication; biometrics; using biometrics ... See more keywords
Photo by shotsbywolf from unsplash

Botanical authentication using one-class modeling.

Sign Up to like & get
recommendations!
Published in 2023 at "Journal of AOAC International"

DOI: 10.1093/jaoacint/qsad023

Abstract: Sample authentication using one-class modeling is simpler and more versatile than the approved AOAC Probability of Identification (POI) method. This approach develops a one-class model for authentic samples and does not identify or model non-authentic… read more here.

Keywords: using one; authentication using; class modeling; class ... See more keywords
Photo by mark0polo from unsplash

Multimodal Personal Ear Authentication Using Acoustic Ear Feature for Smartphone Security

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2021.3137474

Abstract: In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition. However, fingerprint authentication cannot be used when hands are wet, and face recognition cannot… read more here.

Keywords: authentication; authentication using; personal ear; ear authentication ... See more keywords