To see the other types of publications on this topic, follow the link: Biometric access control.

Dissertations / Theses on the topic 'Biometric access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 dissertations / theses for your research on the topic 'Biometric access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Full text
Abstract:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began
APA, Harvard, Vancouver, ISO, and other styles
2

Sumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.

Full text
Abstract:
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually respo
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Ying. "Efficient Anonymous Biometric Matching in Privacy-Aware Environments." UKnowledge, 2014. http://uknowledge.uky.edu/ece_etds/46.

Full text
Abstract:
Video surveillance is an important tool used in security and environmental monitoring, however, the widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics can seriously defeat the goal of privacy protection. In this di
APA, Harvard, Vancouver, ISO, and other styles
4

Norris-Jones, Lynne. "Demonstrate and document : the development of a best practice model for biometric access control management." Thesis, Cardiff Metropolitan University, 2011. http://hdl.handle.net/10369/6411.

Full text
Abstract:
This thesis investigates the social, legal and ethical perceptions of participants towards the implementation of biometric access control systems within a sample of United Kingdom work-based environments. It focuses on the application of fingerprint scanning and facial recognition systems, whilst alluding to the development of more advanced (bleeding edge) technologies in the future. The conceptual framework is based on a tripartite model in which Maslow's Hierarchy of Needs is applied to the workforce whilst the principles of Utilitarianism and the Psychological Contract are applied to both m
APA, Harvard, Vancouver, ISO, and other styles
5

Ribeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.

Full text
Abstract:
Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir que apenas usuários autorizados tenham o acesso permitido é um aspecto fundamental no desenvolvimento destas aplicações. Atualmente, os métodos de controle de acesso simples como senhas ou números de identificação pessoal não devem ser considerados suficientemente seguros, já que um impostor pode conseguir estas informações sem o conhecimento do usuário. Ainda, no caso de utilização de dispositivos físicos com
APA, Harvard, Vancouver, ISO, and other styles
6

McMillan, Stephen. "Design and analysis of a biometric access control system using an electronic olfactory device to identify human odour characteristics." Thesis, University of Greenwich, 2000. http://gala.gre.ac.uk/13136/.

Full text
Abstract:
The use of an electronic olfactory device, termed an electronic 'nose', was investigated for the detection of unique human odour characteristics. The detection of these unique odours was applied to the field of biometrics for access control, where a human's unique characteristics were used to authenticate a user of an access control system. An electronic odour sensing device was designed and constructed using an array of conducting polymer gas sensors in order to facilitate the regular screening of a group of human subjects over a period of six weeks. A static sampling method was used to measu
APA, Harvard, Vancouver, ISO, and other styles
7

Fiorese, Mauricio. "Uma Proposta de autenticação de usuários para ensino a distância." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2000. http://hdl.handle.net/10183/80127.

Full text
Abstract:
Este trabalho investiga diferentes estratégias e técnicas de autenticação de usuários visando determinar quais podem ser integradas em um ambiente de educação a distância. Diversas soluções de autenticação existentes no mercado foram analisadas para se determinar as mais adequadas. Buscou-se as soluções consideradas factíveis de utilização, seja pelo custo ou quantidade de equipamentos extras envolvidos, seja pela simplicidade operacional ou pelo grau de certeza das medidas efetuadas. A partir desta análise foi delineado um modelo de autenticação que integra várias técnicas de autenticação a f
APA, Harvard, Vancouver, ISO, and other styles
8

Brenner, Gabriel Pitágoras Silva e. "Integração de recursos das identificações por radiofrequência e biometria da impressão digital em aplicação direcionada para o controle de acesso de pessoas a áreas industriais." Universidade de Taubaté, 2012. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=575.

Full text
Abstract:
No presente trabalho são abordados estudos sobre elementos do projeto conceitual de um sistema de controle de acessos de pessoas a áreas industriais, voltado para o propósito de oferecer contribuição para o segmento particular daqueles tipos que exigem a utilização de automatização para atender a respectiva viabilização operacional relativa às atividades pertinentes ao controle de acessos em questão. Os testes práticos realizados com protótipos apresentaram resultados satisfatórios, validando os princípios de funcionamento dos elementos envolvidos, haja vista que foram verificadas as realizaçõ
APA, Harvard, Vancouver, ISO, and other styles
9

Lewit, Rozenfeld Rodrigo David. "Plan de Negocios: Control de Acceso Mediante Biometría de Rostro." Tesis, Universidad de Chile, 2010. http://repositorio.uchile.cl/handle/2250/103951.

Full text
Abstract:
El presente trabajo de título tiene como objetivo el desarrollo de un plan de negocios para MatchFace, empresa integradora de tecnología que comercializaría, en Chile, equipos de control de acceso a zonas y servicios restringidos, mediante biometría de rostro. La justificación del proyecto se basa en la detección de una necesidad insatisfecha: controlar el acceso de altos tráficos de individuos. Habiéndose aplicado una metodología acorde al desarrollo de un plan de negocios, los primeros capítulos corresponden al análisis externo de la industria e interno de la empresa. A continuación s
APA, Harvard, Vancouver, ISO, and other styles
10

Foltýn, Petr. "Návrh a realizace jednotek modulárního přístupového systému." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Oliveira, Adriana Esmeraldo de. "API de Segurança e Armazenamento de uma Arquitetura Multibiométrica para Controle de Acesso com Autenticação Contínua." Universidade Federal da Paraí­ba, 2011. http://tede.biblioteca.ufpb.br:8080/handle/tede/6058.

Full text
Abstract:
Made available in DSpace on 2015-05-14T12:36:30Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 4594295 bytes, checksum: bd4f4df655903b796eb6cf79a5060ded (MD5) Previous issue date: 2011-09-16<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior<br>A biometric system that employs one single biometric characteristic is constrained. This limitation can be reduced by fusing the information presented by multiple sources. A system that consolidates the evidence presented by multiple biometric sources is known as a multibiometric system. In such a context, this work proposes the security a
APA, Harvard, Vancouver, ISO, and other styles
12

Balmelli, Chuquisengo Luis Eduardo. "Verificación de identidad de personas mediante sistemas biométricos para el control de acceso a una universidad." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2007. http://tesis.pucp.edu.pe/repositorio/handle/123456789/988.

Full text
Abstract:
El presente documento es el resultado de la investigación realizada en la Pontificia Universidad Católica del Perú para la implementación de sistemas biométricos (lectores de huellas dactilares) como elementos de seguridad. Dada la problemática existente en la universidad (robos, plagios, amontonamiento de personas para ingresar, etc.), al implementar sistemas biométricos se estaría mejorando sustancialmente esta situación, pues aparte de tener un lugar más seguro y confiable, se estaría involucrando a la comunidad universitaria en el uso de tecnología de vanguardia. En el contenido del presen
APA, Harvard, Vancouver, ISO, and other styles
13

Melin, Håkan. "Automatic speaker verification on site and by telephone: methods, applications and assessment." Doctoral thesis, KTH, Tal, musik och hörsel, TMH, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4242.

Full text
Abstract:
Speaker verification is the biometric task of authenticating a claimed identity by means of analyzing a spoken sample of the claimant's voice. The present thesis deals with various topics related to automatic speaker verification (ASV) in the context of its commercial applications, characterized by co-operative users, user-friendly interfaces, and requirements for small amounts of enrollment and test data. A text-dependent system based on hidden Markov models (HMM) was developed and used to conduct experiments, including a comparison between visual and aural strategies for prompting claimants
APA, Harvard, Vancouver, ISO, and other styles
14

Шевчук, Юрій Вікторович, та Yuriy Shenchuk. "Методи та засоби автоматичного розпізнавання відвідувачів в домофонних системах". Master's thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2021. http://elartu.tntu.edu.ua/handle/lib/36705.

Full text
Abstract:
Кваліфікаційна робота присвячена дослідженню методів автоматичного розпізнавання особи в домофонних системах. Проаналізувавши способи розпізнавання людини було визначено біометричну ознаку, за якою можна ідентифікувати особу в домофонних системах. Метод розпізнавання, котрий базується на геометрії обличчя, має найкраще співвідношення точності і зручності та може бути використаний як основний виконання поставленого завдання. Були досліджені існуючі методи локалізації обличчя на зображенні, нормалізації, класифікації та обрані оптимальні для ефективного вирішення поставленої задачі. Розпізнаванн
APA, Harvard, Vancouver, ISO, and other styles
15

SANTHADEVI, D. "A SECURE ACCESS CONTROL USING BIOMETRIC SYSTEM." Thesis, 2011. http://dspace.dtu.ac.in:8080/jspui/handle/repository/13990.

Full text
Abstract:
The absence of secure database access in software development is one of the major issue in the society. Though there is increasing development in the database security systems, due to increasing number of specific attacker’s attacks the security system, it needs effective access control. Biometric technologies such as fingerprint, face and iris recognition have seen an increasing interest throughout the past decades. Such interest has been intensified with various large-scale initiatives from governments that seek to incorporate biometric technologies for the purposes of identification and ve
APA, Harvard, Vancouver, ISO, and other styles
16

Esan, Omobayo Ayonkule. "Optimization of bimodal biometrics system for access control authentication." 2013. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001393.

Full text
Abstract:
M. Tech. Computer System Engineering<br>A single biometric trait for authentication is widely used in some application areas where security is of high importance. However, biometric systems are susceptible to noise, intraclass variation, non-universality and spoof attacks. Thus, there is need to use algorithms that overcome all these limitations found in biometric systems. The use of multimodal biometrics can improve the performance of authentication system. This study proposed using both fingerprint and face for authentication in access system.
APA, Harvard, Vancouver, ISO, and other styles
17

Van, der Haar Dustin Terence. "Collective human biological signal-based identification and authentication in access control environments." Thesis, 2014. http://hdl.handle.net/10210/12392.

Full text
Abstract:
Ph.D. (Computer Science)<br>The introduction of new portable sensors that monitor physiological systems in the human body has allowed quality of life and medical diagnostic applications to be taken directly to the user, without the constraints of physical space or inconvenience. The potential of these sensors in the domain of authentication and identi cation is becoming more feasible each day and current research in these biometric systems show a great deal of promise. Novel biometric systems are being introduced that use biological signals (also known as biosignals) in the human body captured
APA, Harvard, Vancouver, ISO, and other styles
18

Jordaan, Adriaan Louis. "Bio-Swap: a biometrics-based solution to combat SIM swap fraud." Thesis, 2011. http://hdl.handle.net/10210/3707.

Full text
Abstract:
M.Sc. (Computer Science)<br>The past couple of years have seen an explosion in the number of online fraud schemes – Total annual losses exceed tens of millions of Rands. Many people and organizations from all over the world have fallen victim to it. Nobody is safe; everybody is vulnerable. As we increasingly make use of the Internet and mobile technology to do our work and to perform chores such as online banking or shopping, we become even more vulnerable. Fraudsters make use of ever-more sophisticated techniques and clever schemes to target the unsuspecting end-users of mobile and Internet t
APA, Harvard, Vancouver, ISO, and other styles
19

Sui, Yan. "Design and evaluation of a secure, privacy-preserving and cancelable biometric authentication : Bio-Capsule." Thesis, 2014. http://hdl.handle.net/1805/4985.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>A large portion of system breaches are caused by authentication failure either during the system login process or even in the post-authentication session, which is further related to the limitations associated with existing authentication approaches. Current authentication methods, whether proxy based or biometrics based, are hardly user-centric; and they either put burdens on users or endanger users' (biometric) security and privacy. In this research, we propose a biometrics based user-centric authentication approach. The main idea
APA, Harvard, Vancouver, ISO, and other styles
20

Tait, Bobby Laubscher. "Biometriese enkelaantekening tot IT stelsels." Thesis, 2009. http://hdl.handle.net/10210/2428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!