2011 Second International Conference on Innovations in Bio-Inspired Computing and Applications 2011
DOI: 10.1109/ibica.2011.49
|View full text |Cite
|
Sign up to set email alerts
|

Access Control of Cloud Computing Using Rapid Face and Fingerprint Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…Afterward QT/Embedded gets through the kernel driver to activate graphic function. Cloud computing here can perform rapid fingerprint identification and facial recognition in order to fulfill the access control system [21]. We will see whether or not a quick response to client is confirmed.…”
Section: B Establishing Thin Client and Installing Access Controlmentioning
confidence: 99%
“…Afterward QT/Embedded gets through the kernel driver to activate graphic function. Cloud computing here can perform rapid fingerprint identification and facial recognition in order to fulfill the access control system [21]. We will see whether or not a quick response to client is confirmed.…”
Section: B Establishing Thin Client and Installing Access Controlmentioning
confidence: 99%
“…When users sign-in, it will collect users' biometric features with capturing devices at client side as the evidence of legal or illegal sign-in [16]. 6.…”
Section: In-cloud Erp and Access Control Authenticationmentioning
confidence: 99%
“…Examples of large-scale fingerprint systems could be found in the U.S. government including the US-VISIT’s IDENT program [3] and the FBI’s IAFIS services [4]. Recently, applications of fingerprint identification have been also combined with cloud computing technology [5]. …”
Section: Introductionmentioning
confidence: 99%