109 Hits in 2.2 sec


Marcia Gibson, Karen Renaud, Marc Conrad, Carsten Maple
2009 Proceedings of the 2009 workshop on New security paradigms workshop - NSPW '09  
Unfortunately the profusion of web sites and the associated passwords reduces their efficacy and puts severe strain on users' limited cognitive resources.  ...  We report here on the evaluation of a prototype of such a musical password system, which demonstrates superior memorability and acceptance by users and is particularly useful to those with impaired memory  ...  Shuffling the placement rules out the possibility for users to make selections using neuromuscular, or "muscle" memory.  ... 
doi:10.1145/1719030.1719043 dblp:conf/nspw/GibsonRCM09 fatcat:kkcs6csufrch5p4xew72au6dtq


Shaimaa hShaker, Computer Sciences Department, University of Technology.Baghdad / Iraq.
2019 International Journal of Advanced Research  
Introduction:- Biometric authentication system is a system that provides the user process to identify and verify the user's identity and authenticate using dynamic features of the user because it has unique  ...  Srikanta ,Umapada and Michael (2014) present " signature-based biometric authentication",These researchers provided detailed and accurate research on signature-based biometric authentication.  ... 
doi:10.21474/ijar01/9415 fatcat:mmjmukhs4ze5rfs2lbujqdxury

Electromyograph and keystroke dynamics for spoof-resistant biometric authentication

Shreyas Venugopalan, Felix Juefei-Xu, Benjamin Cowley, Marios Savvides
2015 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
Our study is done within the context of a person using a keyboard to type a password or any other fixed phrase.  ...  The experiments have been performed within the context of a user typing a fixed pass phrase at a workstation.  ...  [26] tested static keystroke dynamic authentication on a dataset of 51 subjects, where each subject repeatedly typed a 10character password 400 times.  ... 
doi:10.1109/cvprw.2015.7301326 dblp:conf/cvpr/VenugopalanJCS15 fatcat:oqvro6q3fze73liwssx7uacnra

Table of contents

2021 IEEE Transactions on Industrial Informatics  
He 2632 Neuromuscular Password-Based User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Li 2488 Virtual Sensor Development for Multioutput Nonlinear Processes Based on Bilinear Neighborhood Preserving Regression Model With Localized Construction . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tii.2020.3046401 fatcat:fzybvmopbrdsjhwwr6xjpaqfzq

– New methods Telemedicine system for the care of patients with neuromuscular disease and chronic respiratory failure

Carlos Zamarrón, Emilio Morete, Francisco González
2014 Archives of Medical Science  
Conclusions: Our findings indicate that the system was user friendly for patients and care givers. Patient satisfaction scores were acceptable.  ...  The telemedicine system is based on videoconferencing and telemonitoring of cardiorespiratory variables (oxygen saturation, heart rate, blood pressure and electrocardiogram).  ...  In addition, the system also had a mechanism for user authentication and a password to check the role of the person connecting.  ... 
doi:10.5114/aoms.2014.46223 pmid:25395959 pmcid:PMC4223148 fatcat:m2ctemhpindcrlvhyvnkgagi6y

Score, Rank, and Decision-Level Fusion Strategies of Multicode Electromyogram-based Verification and Identification Biometrics

Ashirbad Pradhan, Jiayuan He, Ning Jiang
2021 IEEE journal of biomedical and health informatics  
The results also suggested that the parameters M and K could be adjusted based on the number of users in the database to facilitate optimal performance.  ...  The nature of sEMG signals provide a unique dual-mode security: sEMGs have individual-specific characteristics (biometrics), and users can customize and change gestures just like passcodes.  ...  The concept of using a gesture sequence as a 28 neuromuscular password was introduced in a previous study 29 [16].  ... 
doi:10.1109/jbhi.2021.3109595 pmid:34473636 fatcat:tp7zqvnqevccbnd2bcf35c2a2i

EEG Authentication System Using Fuzzy Vault Scheme [chapter]

Fatima M. Baqer, Salah Albermany
2022 Biomedical engineering  
Authentication is the process of recognizing a user's identity by determining claimed user identity by checking user-provided evidence, combining cryptographic with biometric can solve many of security  ...  issues, including authentication.  ...  However, without the drawbacks of both passwords-based and biometric-based, the EEG-based biometric authentication system combines their advantages [1] .  ... 
doi:10.5772/intechopen.102699 fatcat:glajypwcyfdi3edguipuz42smu

A Review Paper On Offline Signature Recognition System Using Global Feature, Aco And Neural Network

Ms. Sobia*, Mr. Anil Jaswal
2016 Zenodo  
The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity.  ...  Signatures are verified based on parameters extracted from the signature using various image processing techniques.  ...  Thus the users are more likely to approve this kind of computerized authentication method. [700] feature.  ... 
doi:10.5281/zenodo.55972 fatcat:a3wcqnflcre3lpzwjywom5ccrm

Cyber-Physical System for Near Real-Time Monitoring of At-Home Orthopedic Rehabilitation and Mobile Health–Based Provider-Patient Communications to Improve Adherence: Development and Formative Evaluation (Preprint)

Timothy Stevens, Ryan S McGinnis, Blake Hewgill, Rebecca H Choquette, Timothy W Tourville, Jean Harvey, Richard Lachapelle, Bruce D Beynnon, Michael J Toth, Christian Skalka
2019 JMIR Human Factors  
At-home use of neuromuscular electrical stimulation (NMES) may improve functional recovery, but adherence to at-home interventions is low.  ...  goal and comprises four components: (1) hardware modifications to a commercially available NMES therapy device to monitor device use and provide Bluetooth functionality; (2) an iPhone Operating System-based  ...  In addition to the one-button sync feature, the iOS app also provides user authentication for patients.  ... 
doi:10.2196/16605 pmid:32384052 fatcat:3y74e75v3fcdvmkpftfgvrsc7q

Biobank of Cells, Tissues and DNA from Patients with Neuromuscular Diseases: An Indispensable link between Clinical Centers and the Scientific Community

Marina Mora, Cinzia Bragato, Sara Gibertini, Simona Zanotti, Maurizio Curcio, Eleonora Canioni, Franco Salerno, Flavia Blasevich, Simona Saredi, Alessandra Ruggieri, Maria Barbara Pasanisi, Pia Bernasconi (+3 others)
2017 Open Journal of Bioresources  
(1) Bioresource Overview Project description The biobank of "Cells, tissues and DNA from patients with neuromuscular diseases" (NeuMD) was established in 1986 based on the routine diagnostic activity  ...  Type of sampling Disease based, sampled in clinical care.  ... 
doi:10.5334/ojb.29 fatcat:ybpypixtmfh4xadxv5ylueuzke

A Review Paper Onoffline Signature Recognition System Using Radon Transform , Genetic Algorithm And Neural Network

Rabia Verma*, Assit. Prof. Amit Puri
2016 Zenodo  
The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity.  ...  In this paper, off-line signature recognition & verification using neural network is proposed with Random Transform and Genetic Algorithm, where the signature is captured and presented to the user in an  ...  The biometrics have a significant advantage over traditional authentication techniques (namely passwords, PIN numbers, smart cards etc) due to the fact that biometric characteristics of the individual  ... 
doi:10.5281/zenodo.55974 fatcat:74j4qbhvj5erlo63wzwqsxdltq

Dispelling myths about rare disease registry system development

Matthew Bellgard, Christophe Beroud, Kay Parkinson, Tess Harris, Segolene Ayme, Gareth Baynam, Tarun Weeramanthri, Hugh Dawkins, Adam Hunter
2013 Source Code for Biology and Medicine  
Within the RDRF, the security model consists of several layers: SSL based encryption of all traffic; password access to accounts; and logging of successful and failed user logins.  ...  Security • Appropriate software project management • De-identification process • Team-based software development • Two factor authentication • Well-structured, commented code • Multi-level user  ... 
doi:10.1186/1751-0473-8-21 pmid:24131574 pmcid:PMC4015362 fatcat:waniywidnzg3tca5gfi6ynmv6u


Shaymaa Adnan Abdulrahman
Key Stroke Keystroke Dynamics can be referred to one of the common and cheap behavioral Biometric applications, which utilized in recognizing the user authentication when the user is writing by using the  ...  The dataset comprises of signals of over a hundred users. The dataset is imported to EEG lab for the pre-processing phase. Then artificial immune system based algorithms for user matching was used.  ... 
doi:10.26782/jmcms.2020.08.00049 fatcat:67ciu4v2f5dlvagt56lybjnwcu

Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health

Marcos Faundez-Zanuy, Julian Fierrez, Miguel A. Ferrer, Moises Diaz, Ruben Tolosana, Réjean Plamondon
2020 Cognitive Computation  
Background- This paper summarizes the state-of-the-art and applications based on online handwritting signals with special emphasis on e-security and e-health fields.  ...  for 4-digit passwords.  ...  research in joint applications where security is studied in combination with one of the following health-related aspects: f) Is the user to authenticate under stress?  ... 
doi:10.1007/s12559-020-09755-z fatcat:rsfn5tee2nfivmnznxv2zrc7f4

Human Factors Standards and the Hard Human Factor Problems: Observations on Medical Usability Standards

Lorenzo Strigini, Marwa Gadala
2020 Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies  
With increasing variety and sophistication of computer-based medical devices, and more diverse users and use environments, usability is essential, especially to ensure safety.  ...  It is plausible that these standards have reduced risks for patients, but we raise concerns regarding: (1) complex design trade-offs that are not addressed, (2) a focus on user interface design (e.g.,  ...  HF issues with a need for trade-offs arise in user authentication. Authentication may be needed to prevent malicious use of a medical device (FDA, 2018) .  ... 
doi:10.5220/0009179707660773 dblp:conf/biostec/StriginiG20 fatcat:654cdvhrk5e7lbvt7q55yxi5pq
« Previous Showing results 1 — 15 out of 109 results