A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Special Issue on Enabling Security Technologies for Digital Rights Management
2004
Proceedings of the IEEE
She is an Editor for Computers in Entertainment (ACM) and an Associate Editor for Informing Science. ...
She has served as reviewer for many renowned international journals in the area of multimedia communication and processing. ...
Biometric information can be used in several different ways for authentication of users in DRM systems. ...
doi:10.1109/jproc.2004.827336
fatcat:yuxkun6llvbixhkcbvprfixs2e
Anatomy of a Biometric System
[chapter]
2010
Vein Pattern Recognition
SOA implies delivery of controlled processes and full enablement for role-based access to information. ...
Access control is a method that enterprises use to enable or restrict rights of access to physical facilities or networks and information. ...
doi:10.1201/9781439821381-9
fatcat:vwxcgnefnfhupiomui7capmyni
High-Tech ID and Emerging Technologies
[chapter]
2009
The Future of Identity in the Information Society
In this chapter we examine the roots of identity management and the systems we use to support this activity, ways in which we can strive to keep our digital information secure such as Public Key encryption ...
Technological development has undeniably pervaded every aspect of our lives, and the ways in which we now use our identity related information has not escaped the impact of this change. ...
The selected implementations are especially of interest as a number of technologies are already implemented in this context, e.g., electronic signatures, PKI and biometrics. ...
doi:10.1007/978-3-642-01820-6_4
fatcat:luryo4xkunecdaj46pbjl2vybm
Biometric applications in education
2021
International Journal on Interactive Design and Manufacturing
A literature review is performed to present an overview of biometric technology applications for educational purposes, challenges that must overcome to implement biometric technology, and potentially foreshadowing ...
In addition to identifying students, access control, and personal data management, it has critical applications to improve the academic domain's teaching/learning processes. ...
Acknowledgements The authors would like to acknowledge the financial and technical support of Writing Lab, TecLabs, Tecnológico de Monterrey, México, in the production of this work. ...
doi:10.1007/s12008-021-00760-6
fatcat:id6tlwd4rbhxjp57afrwpd43zy
Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion
2020
Frontiers in Blockchain
It will explore, in particular, the use of blockchain technology and biometrics as a means to ensure the "unicity" and "singularity" of identities, and the associated challenges pertaining to the security ...
and confidentiality of personal information. ...
, as well as Georgy Ishmaev for his comments on a preliminary version of the paper. ...
doi:10.3389/fbloc.2019.00028
fatcat:ob3z6q5ixbfjdei2g4t4c6qqpq
Smart Fingerprint Biometric and RFID Time-Based Attendance Management System
2021
European Journal of Electrical Engineering and Computer Science
In recent years, rapid development has taken place in several applications such as authorization, data access, and access control by implementing biometrics and radio frequency identification technologies ...
The test results show an average duration of 20.61 respective seconds for each student, and zero percent of false refusal rate was recorded in the implementation. ...
This technology is being used in real-world applications such as attendance tracking in large companies, sectors, industries, universities, and secondary and primary schools, among others, where there ...
doi:10.24018/ejece.2021.5.4.339
fatcat:wmjinbxe4venbkryudbsxzp24e
Identification Management in Nigeria: Innovations for Financial Inclusion
2021
Indiana International & Comparative Law Review
About 41.6% of Nigerians have no access to formal financial services. ...
This is basically a technology that enables real-time logging in of information and makes a record of all amendments to the information held on a database. ...
Part III of this work therefore examines the use of biometrics as an alternative and not a supplementary metric of identification. ...
doi:10.18060/25063
fatcat:yfx7wbqkava5bkvtvig5clgluu
Multimodal access control system combining RFID, fingerprint and facial recognition
2020
Indonesian Journal of Electrical Engineering and Computer Science
In this paper, we will examine the different possible scenario in multi-modal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the ...
In practice, multi-biometric aims to reduce the False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) which are two standard metrics widely used in the accuracy of biometric sys-tems. ...
BASICS AND ACCESS CONTROL Access control to an information system consists of associating access rights and / or resources to an entity (person, computer, etc.), thus enabling the entity to access the ...
doi:10.11591/ijeecs.v20.i1.pp405-413
fatcat:eh47aem3sfexxie3c3inwxuocu
Population Aging in the European Information Societies: Towards a Comprehensive Research Agenda in eHealth Innovations for Elderly
2016
Aging and Disease
With the advent of the information society, new research and technological developments have been promoted in the field of assistive technologies and information and communication technologies of benefit ...
The authours attempt to propose a research agenda, by exposing various strengts and weaknesses of eHealth innovations for elderly, mainly grounded in secondary sources analysis. ...
Acknowledgements This work was supported by the European Union through the SEACW project (ICT-PSP-2012), and by the University of Vic -Central University of Catalonia under the grant R0947. ...
doi:10.14336/ad.2015.1214
pmid:27493837
pmcid:PMC4963195
fatcat:e3glstglvzhxtodpdnswx4hduy
ICT-Based Wireless Personal Computing
2017
Wireless personal communications
With the emergence of the smart mobile age, personal users can enjoy a lifestyle that uses content, such as information recommendation and personal services, based on various applications in smart IoT ...
The paper by Jeong and Shin [1] proposes an efficient access reduction scheme for big data based on total probability theory. ...
This study is an AHP-based network interface and channel-selection algorithm for multi-channel MAC protocols in the IoT ecosystem that takes into account a multitude of decision factors, such as expected ...
doi:10.1007/s11277-017-3955-3
fatcat:rnwgzlygvna3bdbauwed5ogyrm
Biometric Mirror
2019
Proceedings of the 2019 on Designing Interactive Systems Conference - DIS '19
In this paper, we discuss Biometric Mirror, a case study that explored opinions about the ethics of an emerging technology. ...
However, as global reports of unfairness emerge, governments, academia and industry have recognized the ethical limitations and societal implications of this technology. ...
ACKNOWLEDGEMENTS The authors wish to thank the anonymous reviewers for their valuable insights and contributions, as well as the media advisors at The University of Melbourne and the entire Science Gallery ...
doi:10.1145/3322276.3322304
dblp:conf/ACMdis/WoutersKV0FNJV19
fatcat:4z67lnz4zrerpeto3r6naesisq
Subverting ID from above and below: The uncertain shaping of India's new instrument of e-governance
2013
Surveillance & Society
This article traces the contours of a new biometric project in India that aims to develop a universal biometric database for the unique identification of India's residents (UID, The Indian Unique Identification ...
We discuss the legal framing of the project and present an ethnographic case study about its implementation among poor people in Delhi. ...
Acknowledgements We would like to thank the University of New South Wales, the University of Leipzig and the Australian Research Council for supporting field research for this article. ...
doi:10.24908/ss.v11i3.4496
fatcat:vm2asldzcjd7ffylz5sf4frpxe
Role of Literacy Level in Financial Inclusion in India: Empirical Evidence
2013
Journal of Economics Business and Management
Thus, the Government should promote the use of Information Communication Technology models like biometric ATM, telecentres to achieve Financial Inclusion in India as these models does not compulsorily ...
Correlation has been statistically tested by using Karl Pearson coefficient of correlation. ...
Telecentres Telecentres are places where shared access to information and communication technology and Information Technology enabled services are available. ...
doi:10.7763/joebm.2013.v1.59
fatcat:6gato6f4lfcsba7nbhe73wrfje
INNOVATION IN RETAIL
2021
Bulletin of the Transilvania University of Brasov. Series V : Economic Sciences
This paper proposes an investigation of the trend concerning both to innovation in the field of retail trade and involvement of technology in streamlining the purchasing process, starting from the example ...
The purpose of this scientific approach is to understand the influence of technological developments within the retail field and to analyze the current state of innovation in this industry for a possible ...
Biometric technology Retail managers continuously make decisions related to the adoption of new technologies available in the field. ...
doi:10.31926/but.es.2021.14.63.2.15
fatcat:3wex6qos7za2faojzsshsvxzve
IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources
2020
IEEE Access
learning offloading framework for heterogeneous mobile edge computing system," ...
He is an Associate Editor of Cluster Computing (Springer), Information Processing and Management (Elsevier), and others. ...
Both mobile edge computing and mobile cloud computing enable technologies for Internet of Things (IoT), smart grids, and e-health applications. ...
doi:10.1109/access.2020.3019975
fatcat:3nfp245xkbfhfmje3vmd2xyrbq
« Previous
Showing results 1 — 15 out of 5,502 results