Zobrazeno 1 - 10
of 212
pro vyhledávání: '"Christophe Rosenberger"'
Publikováno v:
IET Biometrics, Vol 12, Iss 4, Pp 222-234 (2023)
Abstract The exponential growth in the use of smartphones means that users must constantly be concerned about the security and privacy of mobile data because the loss of a mobile device could compromise personal information. To address this issue, co
Externí odkaz:
https://doaj.org/article/4cf3effaa9b74f01883b856f3ab95011
Publikováno v:
Frontiers in Big Data, Vol 6 (2023)
Biometric systems are more and more used for many applications (physical access control, e-payment, etc.). Digital fingerprint is an interesting biometric modality as it can easily be used for embedded systems (smartcard, smartphone, and smartwatch).
Externí odkaz:
https://doaj.org/article/0380dee1e2704549aa81c55d35e8f613
Publikováno v:
Sensors, Vol 20, Iss 18, p 5410 (2020)
Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric re
Externí odkaz:
https://doaj.org/article/f0a3225c66a94fc591f2b5132daf87f0
Publikováno v:
EURASIP Journal on Image and Video Processing, Vol 2008 (2008)
We present in this article a comparative study of well-known supervised evaluation criteria that enable the quantification of the quality of contour detection algorithms. The tested criteria are often used or combined in the literature to create new
Externí odkaz:
https://doaj.org/article/1b7b5dbb14854facb8d530a60c838fc7
Publikováno v:
Multimedia Security 2. :1-30
Publikováno v:
2022 International Conference on Cyberworlds (CW).
Publikováno v:
2022 International Conference on Cyberworlds (CW).
Publikováno v:
CW
By adopting keystroke dynamics, authentication applications can integrate advanced identity proofing technology for detecting fraud and prevent unauthorized access. However, understanding a user's keystroke dynamics behavior in real applications is a
Publikováno v:
CW
User authentication is an important issue to guarantee the security of information systems. For users, this task is in general inconvenient and boring. We propose in this paper a new transparent user authentication based on face recognition. During t
Publikováno v:
18th International Conference on Security and Cryptography
18th International Conference on Security and Cryptography, Jul 2021, Online Streaming, France. pp.747-753, ⟨10.5220/0010577507470753⟩
SECRYPT
18th International Conference on Security and Cryptography, Jul 2021, Online Streaming, France. pp.747-753, ⟨10.5220/0010577507470753⟩
SECRYPT
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2241f0c01d9f61e7e6c8864b00abd794
https://hal.science/hal-03372148
https://hal.science/hal-03372148