Dissertations / Theses on the topic 'Vulnerabilities of biometric system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Vulnerabilities of biometric system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Osoka, Agu. "Assessing and protecting against vulnerabilities of biometric systems." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509630.
Full textHigbee, Matthew Somers. "Deriving System Vulnerabilities Using Log Analytics." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/6139.
Full textJayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textBansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.
Full textSwabey, Matthew A. "The human auditory system as a biometric." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438725.
Full textMuthu, Rajesh. "Development of a secure biometric recognition system." Thesis, Northumbria University, 2016. http://nrl.northumbria.ac.uk/31618/.
Full textShonubi, Felix, Ciara Lynton, Joshua Odumosu, and Daryl Moten. "Exploring Vulnerabilities in Networked Telemetry." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596435.
Full textPoon, Hoi Ting. "Towards a practical and secure biometric authentication system." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/28017.
Full textMcCracken, Wendy Margaret. "Service Delivery To Deaf Children : Vulnerabilities Within The System." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518868.
Full textBrown, Allanah. "The fuel transportation system in British Columbia : attributes and vulnerabilities." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59065.
Full textHan, Wei. "An integrated and distributed biometric-based user authentication architecture." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27851.
Full textKuan, Hung-i. "Evaluation of a biometric keystroke typing dynamics computer security system." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/26530.
Full textAssaad, Firas Souhail. "Biometric Multi-modal User Authentication System based on Ensemble Classifier." University of Toledo / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1418074931.
Full textMai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Full textMohamed, Abdul Cader Akmal Jahan. "Finger biometric system using bispectral invariants and information fusion techniques." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/134464/1/Akmal%20Jahan_Mohamed%20Abdul%20Cader_Thesis.pdf.
Full textCoffman, James Wyatt. "Web-enabling an early warning and tracking system for network vulnerabilities." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397344.
Full textHasegawa, Robert Shigehisa. "Using synthetic images to improve iris biometric performance." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/827.
Full textClarke, Dalton H., and W. Tracy Young. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4607.
Full textYoung, W. Tracy Clarke Dalton H. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FYoung.pdf.
Full textArteaga, Falconi Juan Sebastian. "Towards an Accurate ECG Biometric Authentication System with Low Acquisition Time." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40129.
Full textBashir, Muzaffar [Verfasser], and Hans Robert [Akademischer Betreuer] Kalbitzer. "A novel multisensoric system recording and analyzing human biometric features for biometric and biomedical applications / Muzaffar Bashir. Betreuer: Hans Robert Kalbitzer." Regensburg : Universitätsbibliothek Regensburg, 2011. http://d-nb.info/102331214X/34.
Full textMichaud, David 1975. "Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34817.
Full textCook, Hugh Stephen Thomas. "The reality of a 'High Performance Work System' : internal and external vulnerabilities." Thesis, University of Leeds, 2012. http://etheses.whiterose.ac.uk/4378/.
Full textLee, Jae Hyung S. M. Massachusetts Institute of Technology. "Systematic approach to analyzing security and vulnerabilities of blockchain systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121793.
Full textOkonoboh, Matthias Aifuobhokhan, and Sudhakar Tekkali. "Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2645.
Full textKhan, Shaharyar S. M. Massachusetts Institute of Technology. "Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122437.
Full textFeng, Yicheng. "Template protecting algorithms for face recognition system." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/832.
Full textAbraham, Arya. "It is I: An Authentication System for a Reconfigurable Radio." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34353.
Full textLouw, Lloyd A. B. "Automated face detection and recognition for a login system." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/438.
Full textLam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.
Full textMcMillan, Stephen. "Design and analysis of a biometric access control system using an electronic olfactory device to identify human odour characteristics." Thesis, University of Greenwich, 2000. http://gala.gre.ac.uk/13136/.
Full textGraziano, Timothy Michael. "Establishment of a Cyber-Physical Systems (CPS) Test Bed to Explore Traffic Collision Avoidance System (TCAS) Vulnerabilities to Cyber Attacks." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104624.
Full textNadipelly, Vinaykumar. "Dynamic Scoping for Browser Based Access Control System." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1149.
Full textКостомаха, Марія Володимирівна, та Mariia Kostomakha. "Комп’ютерна система біометричної аутентифікації особи за відбитком пальця". Bachelor's thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2021. http://elartu.tntu.edu.ua/handle/lib/35567.
Full textVarshney, Rimpu. "Towards Designing Open Secure IoT System - Insights for practitioners." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20199.
Full textBoudermine, Antoine. "A dynamic attack graphs based approach for impact assessment of vulnerabilities in complex computer systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT046.
Full textSemerád, Lukáš. "Generování kryptografického klíče z biometrických vlastností oka." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236038.
Full textPASI, RICCARDO. "Flood impact over urban system : how to assess and manage urban vulnerabilities to adapt spatial planning practices at the municipal scale." Doctoral thesis, Università IUAV di Venezia, 2017. http://hdl.handle.net/11578/278743.
Full textLi, Jiawei. "Person re-identification with limited labeled training data." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.
Full textJomaa, Diala. "Fingerprint Segmentation." Thesis, Högskolan Dalarna, Datateknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:du-4264.
Full textKwaa-Aidoo, Ephrem K. "Culturally aligned security in banking. A system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.
Full textÖberg, Fredrik. "Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42294.
Full textKwaa-Aidoo, Ephrem Kwaku. "Culturally aligned security in banking : a system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.
Full textSvoboda, Jan. "System for Recognition of 3D Hand Geometry." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412913.
Full textMehdi, Ali. "Developing a Computer System for the Generation of Unique Wrinkle Maps for Human Faces. Generating 2D Wrinkle Maps using Various Image Processing Techniques and the Design of 3D Facial Ageing System using 3D Modelling Tools." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5144.
Full textJanečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.
Full textFalcão, Thiago Azevedo. "Comparação do desempenho do classificador de novidades com o classificador do vizinho mais próximo no reconhecimento facial." Universidade Federal do Amazonas, 2014. http://tede.ufam.edu.br/handle/tede/3297.
Full textAlsolami, Eesa. "An examination of keystroke dynamics for continuous user authentication." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/54730/1/Eesa_Alsolami_Thesis.pdf.
Full textLaurinavičiūtė, Viktorija. "Nekilnojamojo turto įmonės darbo efektyvumo didinimas naudojant biometrinę pelytę." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090615_104023-15073.
Full textLAUDATO, Gennaro. "Innovative information systems to monitor biomedical parameters during high demanding tasks." Doctoral thesis, Università degli studi del Molise, 2021. http://hdl.handle.net/11695/100496.
Full text