Zobrazeno 1 - 10
of 979
pro vyhledávání: '"authentication system"'
Publikováno v:
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol 13, Iss 1, Pp 53-59 (2024)
The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent studen
Externí odkaz:
https://doaj.org/article/b03ed2c533d2463ebad8e42048aae25b
Publikováno v:
IEEE Access, Vol 12, Pp 116693-116710 (2024)
Recent threats to deep learning-based biometric authentication systems stem from adversarial attacks exploiting vulnerabilities in deep learning models. While existing studies extensively analyze the risk of such attacks, they primarily focus on isol
Externí odkaz:
https://doaj.org/article/d003d117d8f34baa984f968d6db1e307
Publikováno v:
IEEE Access, Vol 11, Pp 79984-79993 (2023)
The wide application of personal biometric information such as face, fingerprint, iris, and voiceprint has simultaneously created many new ethical and legal issues, including the fraudulent use of biometrics. A non-human biometric system is demanded
Externí odkaz:
https://doaj.org/article/b97695cddd9b43caa019e9a43e2e8fef
Publikováno v:
IEEE Access, Vol 11, Pp 78713-78725 (2023)
Recently, deep learning-based biometric authentication systems, especially fingerprint authentication, have been used widely in real-world. However, these systems are vulnerable to adversarial attacks which prevent deep learning models from distingui
Externí odkaz:
https://doaj.org/article/056c5429a3f24802a384e34a0862f464
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 71791-71804 (2022)
“Smart Cities” are a viable option to various issues caused by accelerated urban growth. To make smart cities a reality, smart citizens need to be connected to the “Smart City” through a digital ID. A digital ID enables citizens to utilize sm
Externí odkaz:
https://doaj.org/article/238899a7d6ea4712b2cbfdb57687fcdd
Publikováno v:
网络与信息安全学报, Vol 7, Pp 88-98 (2021)
Most of the blockchain-based identity authentication systems are based on public blockchain, which are still essentially traditional centralized identity management and verification methods, making it difficult to meet the needs of trusted access and
Externí odkaz:
https://doaj.org/article/44be8fe45f1e46688e92b9ab4baba0cb
Publikováno v:
网络与信息安全学报, Vol 7, Iss 6, Pp 88-98 (2021)
Most of the blockchain-based identity authentication systems are based on public blockchain, which are still essentially traditional centralized identity management and verification methods, making it difficult to meet the needs of trusted access and
Externí odkaz:
https://doaj.org/article/b23d2f5efbab4921aaeed082c7e5861b
Publikováno v:
Jisuanji kexue, Vol 48, Iss 11, Pp 36-45 (2021)
The coming of 5G era brings new challenges to the information security of emerging information industries.The exis-ting security technologies can't meet the requirements of millisecond level authentication and trusted authentication for specific scen
Externí odkaz:
https://doaj.org/article/c4da5557acf4498faee0d845f12d1e99