5,502 Hits in 7.6 sec

Special Issue on Enabling Security Technologies for Digital Rights Management

D. Kundur, C.-Y. Lin, B. Macq, H. Yu
2004 Proceedings of the IEEE  
She is an Editor for Computers in Entertainment (ACM) and an Associate Editor for Informing Science.  ...  She has served as reviewer for many renowned international journals in the area of multimedia communication and processing.  ...  Biometric information can be used in several different ways for authentication of users in DRM systems.  ... 
doi:10.1109/jproc.2004.827336 fatcat:yuxkun6llvbixhkcbvprfixs2e

Anatomy of a Biometric System [chapter]

2010 Vein Pattern Recognition  
SOA implies delivery of controlled processes and full enablement for role-based access to information.  ...  Access control is a method that enterprises use to enable or restrict rights of access to physical facilities or networks and information.  ... 
doi:10.1201/9781439821381-9 fatcat:vwxcgnefnfhupiomui7capmyni

High-Tech ID and Emerging Technologies [chapter]

Martin Meints, Mark Gasson
2009 The Future of Identity in the Information Society  
In this chapter we examine the roots of identity management and the systems we use to support this activity, ways in which we can strive to keep our digital information secure such as Public Key encryption  ...  Technological development has undeniably pervaded every aspect of our lives, and the ways in which we now use our identity related information has not escaped the impact of this change.  ...  The selected implementations are especially of interest as a number of technologies are already implemented in this context, e.g., electronic signatures, PKI and biometrics.  ... 
doi:10.1007/978-3-642-01820-6_4 fatcat:luryo4xkunecdaj46pbjl2vybm

Biometric applications in education

Marcela Hernandez-de-Menendez, Ruben Morales-Menendez, Carlos A. Escobar, Jorge Arinez
2021 International Journal on Interactive Design and Manufacturing  
A literature review is performed to present an overview of biometric technology applications for educational purposes, challenges that must overcome to implement biometric technology, and potentially foreshadowing  ...  In addition to identifying students, access control, and personal data management, it has critical applications to improve the academic domain's teaching/learning processes.  ...  Acknowledgements The authors would like to acknowledge the financial and technical support of Writing Lab, TecLabs, Tecnológico de Monterrey, México, in the production of this work.  ... 
doi:10.1007/s12008-021-00760-6 fatcat:id6tlwd4rbhxjp57afrwpd43zy

Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion

Fennie Wang, Primavera De Filippi
2020 Frontiers in Blockchain  
It will explore, in particular, the use of blockchain technology and biometrics as a means to ensure the "unicity" and "singularity" of identities, and the associated challenges pertaining to the security  ...  and confidentiality of personal information.  ...  , as well as Georgy Ishmaev for his comments on a preliminary version of the paper.  ... 
doi:10.3389/fbloc.2019.00028 fatcat:ob3z6q5ixbfjdei2g4t4c6qqpq

Smart Fingerprint Biometric and RFID Time-Based Attendance Management System

E. O. Badmus, O. P. Odekunle, D. O. Oyewobi
2021 European Journal of Electrical Engineering and Computer Science  
In recent years, rapid development has taken place in several applications such as authorization, data access, and access control by implementing biometrics and radio frequency identification technologies  ...  The test results show an average duration of 20.61 respective seconds for each student, and zero percent of false refusal rate was recorded in the implementation.  ...  This technology is being used in real-world applications such as attendance tracking in large companies, sectors, industries, universities, and secondary and primary schools, among others, where there  ... 
doi:10.24018/ejece.2021.5.4.339 fatcat:wmjinbxe4venbkryudbsxzp24e

Identification Management in Nigeria: Innovations for Financial Inclusion

Monye Ogochukwu
2021 Indiana International & Comparative Law Review  
About 41.6% of Nigerians have no access to formal financial services.  ...  This is basically a technology that enables real-time logging in of information and makes a record of all amendments to the information held on a database.  ...  Part III of this work therefore examines the use of biometrics as an alternative and not a supplementary metric of identification.  ... 
doi:10.18060/25063 fatcat:yfx7wbqkava5bkvtvig5clgluu

Multimodal access control system combining RFID, fingerprint and facial recognition

Mohamed El Beqqal, Mostafa Azizi, Jean Louis Lanet
2020 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, we will examine the different possible scenario in multi-modal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the  ...  In practice, multi-biometric aims to reduce the False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) which are two standard metrics widely used in the accuracy of biometric sys-tems.  ...  BASICS AND ACCESS CONTROL Access control to an information system consists of associating access rights and / or resources to an entity (person, computer, etc.), thus enabling the entity to access the  ... 
doi:10.11591/ijeecs.v20.i1.pp405-413 fatcat:eh47aem3sfexxie3c3inwxuocu

Population Aging in the European Information Societies: Towards a Comprehensive Research Agenda in eHealth Innovations for Elderly

Mihaela Vancea, Jordi Solé-Casals
2016 Aging and Disease  
With the advent of the information society, new research and technological developments have been promoted in the field of assistive technologies and information and communication technologies of benefit  ...  The authours attempt to propose a research agenda, by exposing various strengts and weaknesses of eHealth innovations for elderly, mainly grounded in secondary sources analysis.  ...  Acknowledgements This work was supported by the European Union through the SEACW project (ICT-PSP-2012), and by the University of Vic -Central University of Catalonia under the grant R0947.  ... 
doi:10.14336/ad.2015.1214 pmid:27493837 pmcid:PMC4963195 fatcat:e3glstglvzhxtodpdnswx4hduy

ICT-Based Wireless Personal Computing

Sunkyung Rhyu, SangYeob Oh
2017 Wireless personal communications  
With the emergence of the smart mobile age, personal users can enjoy a lifestyle that uses content, such as information recommendation and personal services, based on various applications in smart IoT  ...  The paper by Jeong and Shin [1] proposes an efficient access reduction scheme for big data based on total probability theory.  ...  This study is an AHP-based network interface and channel-selection algorithm for multi-channel MAC protocols in the IoT ecosystem that takes into account a multitude of decision factors, such as expected  ... 
doi:10.1007/s11277-017-3955-3 fatcat:rnwgzlygvna3bdbauwed5ogyrm

Biometric Mirror

Niels Wouters, Ryan Kelly, Eduardo Velloso, Katrin Wolf, Hasan Shahid Ferdous, Joshua Newn, Zaher Joukhadar, Frank Vetere
2019 Proceedings of the 2019 on Designing Interactive Systems Conference - DIS '19  
In this paper, we discuss Biometric Mirror, a case study that explored opinions about the ethics of an emerging technology.  ...  However, as global reports of unfairness emerge, governments, academia and industry have recognized the ethical limitations and societal implications of this technology.  ...  ACKNOWLEDGEMENTS The authors wish to thank the anonymous reviewers for their valuable insights and contributions, as well as the media advisors at The University of Melbourne and the entire Science Gallery  ... 
doi:10.1145/3322276.3322304 dblp:conf/ACMdis/WoutersKV0FNJV19 fatcat:4z67lnz4zrerpeto3r6naesisq

Subverting ID from above and below: The uncertain shaping of India's new instrument of e-governance

Ursula Rao, Graham William Greenleaf
2013 Surveillance & Society  
This article traces the contours of a new biometric project in India that aims to develop a universal biometric database for the unique identification of India's residents (UID, The Indian Unique Identification  ...  We discuss the legal framing of the project and present an ethnographic case study about its implementation among poor people in Delhi.  ...  Acknowledgements We would like to thank the University of New South Wales, the University of Leipzig and the Australian Research Council for supporting field research for this article.  ... 
doi:10.24908/ss.v11i3.4496 fatcat:vm2asldzcjd7ffylz5sf4frpxe

Role of Literacy Level in Financial Inclusion in India: Empirical Evidence

Pallavi Gupta, Bharti Singh
2013 Journal of Economics Business and Management  
Thus, the Government should promote the use of Information Communication Technology models like biometric ATM, telecentres to achieve Financial Inclusion in India as these models does not compulsorily  ...  Correlation has been statistically tested by using Karl Pearson coefficient of correlation.  ...  Telecentres Telecentres are places where shared access to information and communication technology and Information Technology enabled services are available.  ... 
doi:10.7763/joebm.2013.v1.59 fatcat:6gato6f4lfcsba7nbhe73wrfje


Marius Bălășescu, Transilvania University of Brașov
2021 Bulletin of the Transilvania University of Brasov. Series V : Economic Sciences  
This paper proposes an investigation of the trend concerning both to innovation in the field of retail trade and involvement of technology in streamlining the purchasing process, starting from the example  ...  The purpose of this scientific approach is to understand the influence of technological developments within the retail field and to analyze the current state of innovation in this industry for a possible  ...  Biometric technology Retail managers continuously make decisions related to the adoption of new technologies available in the field.  ... 
doi:10.31926/ fatcat:3wex6qos7za2faojzsshsvxzve

IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources

Muhammad Khurram Khan, Junaid Shuja, Yaser Jararweh, Guanding Yu, Mohsen Guizani, Christos Verikoukis, Raja Wasim Ahmad
2020 IEEE Access  
learning offloading framework for heterogeneous mobile edge computing system,"  ...  He is an Associate Editor of Cluster Computing (Springer), Information Processing and Management (Elsevier), and others.  ...  Both mobile edge computing and mobile cloud computing enable technologies for Internet of Things (IoT), smart grids, and e-health applications.  ... 
doi:10.1109/access.2020.3019975 fatcat:3nfp245xkbfhfmje3vmd2xyrbq
« Previous Showing results 1 — 15 out of 5,502 results