Browsing by Subject "User authentication"
Now showing items 1-4 of 4
-
A novel Two-Factor HoneyToken Authentication Mechanism
(2021)The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the ... -
Speed optimized face recognition on mobile devices using Eigenfaces decomposition
(2010)Face recognition on mobile devices can be utilized for security applications (e.g., user authentication) or in the context of pervasive and assistive computing for the support of elderly suffering from dementia in recognizing ... -
User authentication method and implementation using a three-axis accelerometer
(2010)The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique user authentication. We present an efficient recognition algorithm for such interaction using a single three-axis ... -
Using deep learning neural networks for ECG based authentication
(2017)Traditional password based authentication has been proven inadequate and the use of biometrics have provided multiple solutions through the past years. One of the most recent approaches to biometric authentication is using ...