Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Mohammed, El Haziti"'
Autor:
Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Wadood Abdul, Driss Aboutajdine, Mohammed El Haziti
Publikováno v:
Mobile Information Systems, Vol 2016 (2016)
With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detai
Autor:
Maryam Lafkih, Wadood Abdul, Sanaa Ghouzali, Mounia Mikram, Patrick Lacharme, Mohammed El Haziti, Cristophe Rosenberger, Driss Aboutajdine
Publikováno v:
2015 First International Conference on Anti-Cybercrime (ICACC).
Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However
Autor:
Maryam Lafkih, Sanaa Ghouzali, Driss Aboutajdine, Mounia Mikram, Patrick Lacharme, Mohammed El Haziti, Christophe Rosenberger
Publikováno v:
IWCMC
International Wireless Communications & Mobile Computing Conference (IWCMC)
International Wireless Communications & Mobile Computing Conference (IWCMC), Apr 2015, Dubrovnic, Croatia
International Wireless Communications & Mobile Computing Conference (IWCMC)
International Wireless Communications & Mobile Computing Conference (IWCMC), Apr 2015, Dubrovnic, Croatia
Biometric cryptosystems represent emerging techniques for biometric template protection. These cryptosystems are vulnerable to different types of attacks, as brute force attacks or correlation attacks if several templates are compromised. Another bio
Publikováno v:
Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015: MedCT 2015 Volume 1; 2016, p247-255, 9p
Autor:
Lafkih, Maryam, Lacharme, Patrick, Rosenberger, Cristophe, Mikram, Mounia, Ghouzali, Sanaa, Haziti, Mohammed El, Abdul, Wadood, Aboutajdine, Driss
Publikováno v:
2015 First International Conference on Anti-Cybercrime (ICACC); 2015, p1-5, 5p
Publikováno v:
2015 First International Conference on Anti-Cybercrime (ICACC); 2015, p1-5, 5p
Publikováno v:
2015 First International Conference on Anti-Cybercrime (ICACC); 2015, p1-4, 4p
Autor:
Lafkih, Maryam, Lacharme, Patrick, Rosenberger, Christophe, Mikram, Mounia, Ghouzali, Sanaa, El Haziti, Mohammed, Aboutajdine, Driss
Publikováno v:
2015 IEEE 21st International Conference on Embedded & Real-Time Computing Systems & Applications; 2015, p822-827, 6p
Publikováno v:
2015 IEEE 21st International Conference on Embedded & Real-Time Computing Systems & Applications; 2015, p1-34, 34p
Autor:
Gacovski, Zoran
Biometrics Authentication Methods deals with the methods and approaches of biometrics and the fundamental principles involved in the hand shape biometrics. It consists of modern trends involved in the techniques related to biometrics and their evalua