Articoli di riviste sul tema "Personal Authentication"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Personal Authentication".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Noh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park e Youngjoo Shin. "Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes". Security and Communication Networks 2022 (29 settembre 2022): 1–14. http://dx.doi.org/10.1155/2022/7997509.
Testo completoAriyama, Hirotaka. "A Personal Authentication Method". IEEJ Transactions on Electronics, Information and Systems 107, n. 1 (1987): 62–66. http://dx.doi.org/10.1541/ieejeiss1987.107.1_62.
Testo completoKumar, Ajay, David C. M. Wong, Helen C. Shen e Anil K. Jain. "Personal authentication using hand images". Pattern Recognition Letters 27, n. 13 (ottobre 2006): 1478–86. http://dx.doi.org/10.1016/j.patrec.2006.02.021.
Testo completoOrtega-Garcia, J., J. Bigun, D. Reynolds e J. Gonzalez-Rodriguez. "Authentication gets personal with biometrics". IEEE Signal Processing Magazine 21, n. 2 (marzo 2004): 50–62. http://dx.doi.org/10.1109/msp.2004.1276113.
Testo completoMahesh, Renuka. "Personal Authentication Using Finger Images". International Journal on Recent and Innovation Trends in Computing and Communication 3, n. 1 (2015): 389–93. http://dx.doi.org/10.17762/ijritcc2321-8169.150177.
Testo completoKang, Hyeok, Keun-Ho Lee e Gui-Jung Kim. "Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication". Cluster Computing 22, S1 (22 novembre 2017): 2017–26. http://dx.doi.org/10.1007/s10586-017-1234-4.
Testo completoMaslova, N. O., e D. O. Polunina. "BIOMETRIC AUTHENTICATION METHODS FOR PERSONAL IDENTIFICATION". Naukovyi visnyk Donetskoho natsionalnoho tekhnichnoho universytetu 1(2), n. 2(3) (2019): 12–20. http://dx.doi.org/10.31474/2415-7902-2019-1(2)-2(3)-12-20.
Testo completoKumar, Ajay, e Ch Ravikanth. "Personal Authentication Using Finger Knuckle Surface". IEEE Transactions on Information Forensics and Security 4, n. 1 (marzo 2009): 98–110. http://dx.doi.org/10.1109/tifs.2008.2011089.
Testo completoMoon, Jaegeun, e Im Y. Jung. "Authentication for Wireless Personal Area Network". Advanced Science Letters 23, n. 10 (1 ottobre 2017): 9713–17. http://dx.doi.org/10.1166/asl.2017.9781.
Testo completoLin, Hung-Yu, e Lein Harn. "Authentication protocols for personal communication systems". ACM SIGCOMM Computer Communication Review 25, n. 4 (ottobre 1995): 256–61. http://dx.doi.org/10.1145/217391.217456.
Testo completoHan, Chin-Chuan, Hsu-Liang Cheng, Chih-Lung Lin e Kuo-Chin Fan. "Personal authentication using palm-print features". Pattern Recognition 36, n. 2 (febbraio 2003): 371–81. http://dx.doi.org/10.1016/s0031-3203(02)00037-7.
Testo completoKumar, Ajay, e David Zhang. "Personal authentication using multiple palmprint representation". Pattern Recognition 38, n. 10 (ottobre 2005): 1695–704. http://dx.doi.org/10.1016/j.patcog.2005.03.012.
Testo completoFons, Mariano, Francisco Fons, Enrique Cantó e Mariano López. "FPGA-based Personal Authentication Using Fingerprints". Journal of Signal Processing Systems 66, n. 2 (15 ottobre 2011): 153–89. http://dx.doi.org/10.1007/s11265-011-0629-3.
Testo completoMariño, C., M. G. Penedo, M. Penas, M. J. Carreira e F. Gonzalez. "Personal authentication using digital retinal images". Pattern Analysis and Applications 9, n. 1 (10 gennaio 2006): 21–33. http://dx.doi.org/10.1007/s10044-005-0022-6.
Testo completoFeng, Xuanang, Yi Zuo, Eisuke Kita e Fumiya Saito. "Personal Authentication Using a Kinect Sensor". Review of Socionetwork Strategies 11, n. 2 (28 novembre 2017): 201–15. http://dx.doi.org/10.1007/s12626-017-0010-5.
Testo completoZukarnain, Zuriati Ahmad, Amgad Muneer e Mohd Khairulanuar Ab Aziz. "Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges". Symmetry 14, n. 4 (14 aprile 2022): 821. http://dx.doi.org/10.3390/sym14040821.
Testo completoB S, Shruthi, e Manasa K B. "USER AUTHENTICATION USING EYE-BLINK PASSWORD". International Journal of Computer Science and Mobile Computing 12, n. 4 (30 aprile 2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Testo completoShin, Siho, Mingu Kang, Jaehyo Jung e Youn Tae Kim. "Development of Miniaturized Wearable Wristband Type Surface EMG Measurement System for Biometric Authentication". Electronics 10, n. 8 (13 aprile 2021): 923. http://dx.doi.org/10.3390/electronics10080923.
Testo completoLoginovskiy, O. V., M. E. Koval e A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems". Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, n. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.
Testo completoLee, Sun-Woo, Duk-Kyun Woo e Pyeong-Soo Mah. "Personal Authentication Method using Segment PPG signals". Journal of the Institute of Electronics and Information Engineers 56, n. 6 (30 giugno 2019): 45–51. http://dx.doi.org/10.5573/ieie.2019.56.6.45.
Testo completoMalassiotis, S., N. Aifanti e M. G. Strintzis. "Personal Authentication Using 3-D Finger Geometry". IEEE Transactions on Information Forensics and Security 1, n. 1 (marzo 2006): 12–21. http://dx.doi.org/10.1109/tifs.2005.863508.
Testo completoTao, Qian, e Raymond Veldhuis. "Biometric Authentication System on Mobile Personal Devices". IEEE Transactions on Instrumentation and Measurement 59, n. 4 (aprile 2010): 763–73. http://dx.doi.org/10.1109/tim.2009.2037873.
Testo completoLim, Dai-Hwan. "Personal Authentication System Using Multimodal Biometric Algorithm". Journal of Korean Institute of Information Technology 15, n. 12 (21 dicembre 2017): 147–56. http://dx.doi.org/10.14801/jkiit.2017.15.12.147.
Testo completoHsu, Chih-Bin. "Personal authentication through dorsal hand vein patterns". Optical Engineering 50, n. 8 (1 agosto 2011): 087201. http://dx.doi.org/10.1117/1.3607413.
Testo completoZhang, Chongyang. "Representation of face images for personal authentication". Optik - International Journal for Light and Electron Optics 124, n. 17 (settembre 2013): 2985–92. http://dx.doi.org/10.1016/j.ijleo.2012.09.015.
Testo completoUmamaheswari.R, Umamaheswari R. "An Enhanced Biometric System for Personal Authentication". IOSR Journal of Electronics and Communication Engineering 6, n. 3 (2013): 63–69. http://dx.doi.org/10.9790/2834-0636396.
Testo completoVyshnevsky, V. V., T. M. Romanenko, Yu O. Luhovsky e O. F. Boretsky. "Data preparation services for the authentication of people by their electrocardiogram". Mathematical machines and systems 3 (2022): 58–69. http://dx.doi.org/10.34121/1028-9763-2022-3-58-69.
Testo completoHuang, Juanjuan, Yuhang Xue e Linhui Liu. "Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems". Processes 11, n. 1 (6 gennaio 2023): 190. http://dx.doi.org/10.3390/pr11010190.
Testo completoR, Dr Sharavanakumar. "EYE Blinking for Password Authentication". International Journal for Research in Applied Science and Engineering Technology 10, n. 6 (30 giugno 2022): 2758–66. http://dx.doi.org/10.22214/ijraset.2022.44434.
Testo completoSenthil Kumar, T., S. Prabhakaran e V. Prashanth. "Four-way handshake protocol for authenticating in multiple mix-zones". International Journal of Engineering & Technology 7, n. 2.4 (10 marzo 2018): 200. http://dx.doi.org/10.14419/ijet.v7i2.4.13039.
Testo completoNanglae, Nilobon, Bello Musa Yakubu e Pattarasinee Bhattarakosol. "Extraction of Hidden Authentication Factors from Possessive Information". Journal of Sensor and Actuator Networks 12, n. 4 (11 agosto 2023): 62. http://dx.doi.org/10.3390/jsan12040062.
Testo completoRajagopal, Gayathri, e Senthil Kumar Manoharan. "Personal Authentication Using Multifeatures Multispectral Palm Print Traits". Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/861629.
Testo completoChoi, Jiwoo, Sangil Choi e Taewon Kang. "Smartphone Authentication System Using Personal Gaits and a Deep Learning Model". Sensors 23, n. 14 (14 luglio 2023): 6395. http://dx.doi.org/10.3390/s23146395.
Testo completoRajasingh, J. Paul, e D. Sai Yaswanth. "Fingerprint Authentication". International Journal of Engineering and Advanced Technology 10, n. 5 (30 giugno 2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.
Testo completoChaudhary, Sumit, Monika Garg e Neha Singh. "IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, n. 3 (30 novembre 2012): 428–32. http://dx.doi.org/10.24297/ijct.v3i3a.2950.
Testo completoKim, Hanvit, Haena Kim, Se Chun, Jae-Hwan Kang, Ian Oakley, Youryang Lee, Jun Ryu et al. "A Wearable Wrist Band-Type System for Multimodal Biometrics Integrated with Multispectral Skin Photomatrix and Electrocardiogram Sensors". Sensors 18, n. 8 (20 agosto 2018): 2738. http://dx.doi.org/10.3390/s18082738.
Testo completoAsha G. M, Asha G. M., e Latha B. M. Latha B. M. "Feature Extraction of an Iris for Personal Authentication Based on Gabor Wavelet". International Journal of Scientific Research 2, n. 5 (1 giugno 2012): 260–62. http://dx.doi.org/10.15373/22778179/may2013/86.
Testo completoYang, Tay Yi, Palaniappan Shamala, Muruga Chinniah e Cik Feresa Mohd Foozy. "Graphical Password Authentication For Child Personal Storage Application". Journal of Physics: Conference Series 1793, n. 1 (1 febbraio 2021): 012065. http://dx.doi.org/10.1088/1742-6596/1793/1/012065.
Testo completoZHU, Le-Qing, San-Yuan ZHANG e Rui XING. "Automatic Personal Authentication Based on Finger Phalangeal Prints". Acta Automatica Sinica 35, n. 7 (10 agosto 2009): 875–81. http://dx.doi.org/10.3724/sp.j.1004.2009.00875.
Testo completoThapliyal, Amitabh, Om Prakash Verma e Amioy Kumar. "Behavioral biometric based personal authentication in feature phones". International Journal of Electrical and Computer Engineering (IJECE) 12, n. 1 (1 febbraio 2022): 802. http://dx.doi.org/10.11591/ijece.v12i1.pp802-815.
Testo completoVerma, Gaurav, e Aloka Sinha. "Digital holographic-based cancellable biometric for personal authentication". Journal of Optics 18, n. 5 (24 marzo 2016): 055705. http://dx.doi.org/10.1088/2040-8978/18/5/055705.
Testo completoXiangqian Wu, D. Zhang e Kuanquan Wang. "Palm line extraction and matching for personal authentication". IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 36, n. 5 (settembre 2006): 978–87. http://dx.doi.org/10.1109/tsmca.2006.871797.
Testo completoHsu, Chih-Bin. "Errata: Personal authentication through dorsal hand vein patterns". Optical Engineering 50, n. 9 (1 settembre 2011): 099802. http://dx.doi.org/10.1117/1.3645079.
Testo completoZhang, Lin, Lei Zhang, David Zhang e Hailong Zhu. "Online finger-knuckle-print verification for personal authentication". Pattern Recognition 43, n. 7 (luglio 2010): 2560–71. http://dx.doi.org/10.1016/j.patcog.2010.01.020.
Testo completoKang, Jae-Hwan, Young Chang Jo e Sung-Phil Kim. "Electroencephalographic feature evaluation for improving personal authentication performance". Neurocomputing 287 (aprile 2018): 93–101. http://dx.doi.org/10.1016/j.neucom.2018.01.074.
Testo completoKarnan, M., M. Akila e N. Krishnaraj. "Biometric personal authentication using keystroke dynamics: A review". Applied Soft Computing 11, n. 2 (marzo 2011): 1565–73. http://dx.doi.org/10.1016/j.asoc.2010.08.003.
Testo completoSaito, F., A. Hara, N. Kubo e E. Kita. "1406 Study on Personal Authentication by Kinect Sensor". Proceedings of Design & Systems Conference 2014.24 (2014): _1406–1_—_1406–5_. http://dx.doi.org/10.1299/jsmedsd.2014.24._1406-1_.
Testo completoChoi, Jiwoo, Sangil Choi e Taewon Kang. "Smartphone Authentication System using Personal Gaits and CNN". Journal of Korean Institute of Information Technology 20, n. 10 (31 ottobre 2022): 71–82. http://dx.doi.org/10.14801/jkiit.2022.20.10.71.
Testo completoZiyatbekova, G. Z., e M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint". Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, n. 4 (30 dicembre 2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.
Testo completoBao, Song De. "A Security Authentication Method of Mobile RFID". Advanced Materials Research 268-270 (luglio 2011): 1077–81. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1077.
Testo completo