2015 IEEE International Symposium on Technology and Society (ISTAS) 2015
DOI: 10.1109/istas.2015.7439439
|View full text |Cite
|
Sign up to set email alerts
|

Biometric technology and smartphones: A consideration of the practicalities of a broad adoption of biometrics and the likely impacts

Abstract: Publication InformationCorcoran, Peter and Costache, Claudia (2016)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…According to one report [37], the global biometric technology market was valued at 17.16 billion USD in 2018 and is expected to reach approximately 59.43 USD billion by 2025, growing at a compound annual growth rate of 19.42% between 2019 and 2025. The deployment of mobile biometrics is growing rapidly [38] and this is now considered a robust authentication method for virtually all mobile devices and smartphones [39], [40]. Table 1 compares some biometric technologies in terms of different aspects such as accuracy, performance, cost, measurability, and security level.…”
Section: Figure 1 Biometric Technologies Used In Applications In 2018mentioning
confidence: 99%
“…According to one report [37], the global biometric technology market was valued at 17.16 billion USD in 2018 and is expected to reach approximately 59.43 USD billion by 2025, growing at a compound annual growth rate of 19.42% between 2019 and 2025. The deployment of mobile biometrics is growing rapidly [38] and this is now considered a robust authentication method for virtually all mobile devices and smartphones [39], [40]. Table 1 compares some biometric technologies in terms of different aspects such as accuracy, performance, cost, measurability, and security level.…”
Section: Figure 1 Biometric Technologies Used In Applications In 2018mentioning
confidence: 99%
“…The utility of these protocols in the context of outsourced data protection has been demonstrated in works like [ 123 ], computing cryptographic keys using biometric data via SSS, and [ 124 , 125 ], making use of the ZKP protocol to prevent the vulnerability of the biometrics used in authentication protocols. Different proposals could be based on machine learning techniques combined with SSS, avoiding that only one party knows all the information, as an agreement between several third parties is necessary to access information.…”
Section: Conclusion and Future Workmentioning
confidence: 99%
“…The conventional methods such as login and password for authentication on a smart node does not in fact compliment the IoT technology When objective is to achieve efficiency with IoT, conventional authentication methods become a bottleneck to it. In this context, passwords can be forgotten, guessed or shared, compromising security and exposing the endpoint [54]. It can also compromise the security of other IoT devices if similar password is used.…”
Section: Iot Biometrics Domainmentioning
confidence: 99%