A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Biometric authentication for mobile government security
2010
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems
With the rapid growth of mobile devices and Internet services, there is a growing need for user and government authentication for the protection of data and services, and to promote public trust. ...
Mobile government provides unique opportunities to utilize mobile technology to receive government services and information literally from any place, at any time, using varieties of wireless networks. ...
Data includes users', service providers', and network operators' concerns and perceptions regarding the application of biometric authentication into mobile devices for government services. ...
doi:10.1109/icicisys.2010.5658854
fatcat:nq5ivuwu2vdsvedvdqu6sbdf6m
BAMCloud: A Cloud Based Mobile Biometric Authentication Framework
[article]
2017
arXiv
pre-print
The main reason for biometric technologies becoming more common in the everyday lives of consumers is because of the facility to easily capture biometric data in real time, using their mobile phones. ...
For this purpose we have implemented it using MapReduce on Hadoop platform and for training Levenberg-Marquardt backpropagation neural network has been used. ...
It is further acknowledged that Farhana Javed Zareen and Kashish Ara Shakil share equal contributions for the work carried out in this article. ...
arXiv:1601.02781v2
fatcat:22zdiog75rhuvlvgcs7sggxxc4
Data mining in mobile ECG based biometric identification
2014
Journal of Network and Computer Applications
Therefore, these outcomes support the usability of ECG based biometric identification in a mobile environment. ...
This paper investigates the robustness of performing biometric identification in a mobile environment using electrocardiogram (ECG) signals. ...
networks on mobile devices. ...
doi:10.1016/j.jnca.2014.04.008
fatcat:t4kvopawhjhm5fbzdrlemzcaxq
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends
[article]
2019
arXiv
pre-print
The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. ...
Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. ...
[32] , a deep convolutional neural network is proposed for mobile IoT devices. ...
arXiv:1901.09374v1
fatcat:tglfqlpnczhufoutjae6ogunz4
Performance Evaluation of Mobile Sensor for Context Awareness User Authentication
2022
Zenodo
The mobile data used includes gyroscope, accelerometer, linear accelerometer, proximity, gravity, and magnetometer sensor data. A feedforward neural network was used for data classification. ...
These sensors can be leveraged upon as a solution for user authentication. This research analyzed and evaluated different mobile device sensors for continuous and transparent user authentication. ...
Furthermore, from the analysis of most sensors on mobile devices, sensory data can be in a continuous manner if the mobile device is being used. ...
doi:10.5281/zenodo.6763156
fatcat:vsg7ertrkfekfc2pefmthba4ji
Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory
[chapter]
2012
Security Enhanced Applications for Information Systems
the 3G case, for the mobile device to authenticate the access network. ...
providers', and network operators' about applying biometric authentication into mobile devices for government services. ...
Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory, Security Enhanced Applications for Information Systems, Dr. ...
doi:10.5772/36881
fatcat:pc5unrvazzfullgjwwgp7a3w64
Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones
2012
International Journal of Advanced Computer Science and Applications
Thus, stronger identification is needed to ensure data security and privacy. In this paper, we will explain the employment of biometrics to computer and mobile platforms. ...
Finally, we propose an authentication scheme for smart phones that shows positive results. ...
ACKNOWLEDGMENT We would like to thank Professor Walter Beagley, Professor of Psychology at Alma College for letting us use the Eye Lines Program to collect the data. ...
doi:10.14569/ijacsa.2012.031017
fatcat:rauczqen5jhcfo5cklwtonnuu4
Users" Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia
2013
Journal of clean energy technologies
With the rapid growth of mobile phone devices, there is a growing need for user authentication for the protection of data and services, and to promote public trust. ...
The results show that applying biometric authentication can meet the users' requirements for protecting sensitive information on their mobile device. ...
DATA ANALYSIS AND DISCUSSION The Statistical Package for Social Sciences (SPSS) software was used to accomplish the statistical analysis of the 311 questionnaires. ...
doi:10.7763/ijcte.2013.v5.798
fatcat:dvzotpmyobgr7iwcmpjhockqua
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
2019
Security and Communication Networks
The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. ...
Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. ...
[33] , a deep convolutional neural network is proposed for mobile IoT devices. ...
doi:10.1155/2019/5452870
fatcat:wvabztvuvndoloe3p2gyvoy5ha
Continuous user authentication using multi-modal biometrics
2015
Computers & security
The modern mobile handheld devices are capable to provide a wide range of services and applications over multiple networks. ...
This research investigated three behavioural biometric techniques based on SMS texting activities and messages, looking to apply these techniques as a multi-modal biometric authentication method for mobile ...
data was utilised for training the neural network. ...
doi:10.1016/j.cose.2015.06.001
fatcat:as4gtrnngbgmlmcay27kvezeba
A Novel Biometric Identification Based on a User's Input Pattern Analysis for Intelligent Mobile Devices
2012
International Journal of Advanced Robotic Systems
The existing physical and behavioural biometric identification methods -looked upon as good alternatives -are unsuitable for the current mobile environment. ...
This paper proposes a specially designed biometric identification method for intelligent mobile devices by analysing the user's input patterns, such as a finger's touch duration, pressure level and the ...
We foresee that the mobile environment and device techniques will have greater diversity in the near future, and thus this work can be expanded in many areas that use intelligent mobile devices. ...
doi:10.5772/51319
fatcat:k7xpvk3o4raznidabif2jq4zkq
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
2022
ACM Computing Surveys
Through a Citation Network Analysis (CNA), we identified that there are currently three primary focus research areas on CA - Keystroke Dynamics; Mouse Movements; and Mobile Device Touch, as well as identify ...
This study also highlights the current gaps in the literature such as the need for a consensus over how to evaluate the application and utility of CA, and the need to examine the feasibility of CA technologies ...
For item 4, VOSviewer -a software tool for creating maps to visualise and explore network data was utilised to build a network based on citation relations obtained as per item 3 [106] . ...
doi:10.1145/3533705
fatcat:ost6hf44xrdznolmmrxzvk4mgi
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions
2007
International Journal of Network Security
BIO3G provides real end-to-end strong user authentication to the mobile operator, requiring no storing or transferring of biometric data and eliminating the need for biometric enrolment and administration ...
This paper describes a protocol, called BIO3G, for establishing secure and privacy friendly biometric authentication in 3G mobile environments. ...
The analysis indicated that biometric data should not be stored, neither by the mobile operator, or the UMTS Subscriber Identity Module (USIM), or user equipment. ...
dblp:journals/ijnsec/DimitriadisS07
fatcat:7b7iwuctafhtta3ijnn6ghmtp4
A critical insight into the identity authentication systems on smartphones
2019
Indonesian Journal of Electrical Engineering and Computer Science
<span>The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ...
In this paper, a survey based on various biometric and non-biometric access management schemes has been performed. ...
In [46] , sensitive data leakage prevention mechanism for Android mobile devices has been proposed. ...
doi:10.11591/ijeecs.v13.i3.pp982-989
fatcat:7xz3hiialnfjzjkd77evwnqtg4
NOISE RESISTANCE OF REMOTE AUTHENTICATION VIA LTE NETWORK
2020
Information and Telecommunication Sciences
These networks provide high-quality mobile services and have increased transmission rates and often used for remote biometric authentication, but the influence of noise and fading in wireless channels ...
We use computer simulation of biometric authentication system for preparing biometric template and Matlab models of wireless communication channel using the LTE technology for analysis of influence of ...
Fig. 1 1 Сomparison of biometric authentication methods based on multi-criteria analysis
Fig. 2 2 Preparing biometric data for transmission
Fig. 3 3 Dependence of BER on the SNR value at different ...
doi:10.20535/2411-2976.22020.38-43
fatcat:bkwxvzyta5adnnonesvzu7nrhi
« Previous
Showing results 1 — 15 out of 19,102 results