2010 Fifth International Conference on Broadband and Biomedical Communications 2010
DOI: 10.1109/ib2com.2010.5723618
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of subjects and devices using biometrics and identity management systems for persuasive mobile computing: A survey paper

Abstract: With the advances in Information Technology (IT) there has been an increase in threats to the communication systems and its assets. One of the most important issues of all IP networks that integrate wireless and wired technologies is the applicability and performance of the electronic identification and authentication methods. These schemes employ a variety of technologies of different degrees of security.Biometrics technology nowadays is typically considered a security necessity, tightly coupled with the foun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…This technique is assumed to be better than authentication technologies such as passwords, PIN, or tokens that require people to remember multiple words and numbers but still vulnerable. Various biometric-based systems for remote user authentication have been suggested as summarized in [31][32][33] summarize a good representative selection.…”
Section: Combining Biometric Fingerprints As Additional Security Enhamentioning
confidence: 99%
“…This technique is assumed to be better than authentication technologies such as passwords, PIN, or tokens that require people to remember multiple words and numbers but still vulnerable. Various biometric-based systems for remote user authentication have been suggested as summarized in [31][32][33] summarize a good representative selection.…”
Section: Combining Biometric Fingerprints As Additional Security Enhamentioning
confidence: 99%
“…One of the core functions of IMS is user authentication based on the digital identity presented by the end user. Integration of biometrics as digital identity into the framework of an IMS holds a lot of promise with associated challenges [1] [2]. Biometric data uniquely identify a user and authenticate them based on their physical or behaviouraltraits.…”
Section: Fig 1 Biometric Authentication Systemmentioning
confidence: 99%
“…Several researchers addressed the issues of usability and security to be adapted to the successful authentication solutions. In [6] studied various aspects of these issues. They presented a concise survey on different types of biometric methods.…”
Section: State-of-the-art Technology Of Biometric Authenticationmentioning
confidence: 99%
“…Since the survey was conducted online, this suggests that regardless of respondents' income, the large majority still had access to the internet. 312.99% 10 RM 3,000 to RM 3,999 416.88% 13 RM 4,000 to RM 4,999 519.48% 15 RM 5,000 and up (6) 40.26% 31 Total 100.00% 77…”
Section: Incomementioning
confidence: 99%
See 1 more Smart Citation