7th International Conference on Broadband Communications and Biomedical Applications 2011
DOI: 10.1109/ib2com.2011.6217912
|View full text |Cite
|
Sign up to set email alerts
|

Biometrics, device metrics and pseudo metrics in a multifactor authentication with artificial intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(22 citation statements)
references
References 22 publications
0
22
0
Order By: Relevance
“…There is more work on the multifactor authentication [7,8] and finally we note there is some preliminary work that discusses the idea of an authentication middleware [9], which more closely relates to one of the key themes of this paper.…”
Section: Related Workmentioning
confidence: 97%
See 2 more Smart Citations
“…There is more work on the multifactor authentication [7,8] and finally we note there is some preliminary work that discusses the idea of an authentication middleware [9], which more closely relates to one of the key themes of this paper.…”
Section: Related Workmentioning
confidence: 97%
“…A further study on multifactor authentication using a personal identity number, a mobile phone device, and biometrics as the three factors is presented in [8]. Finally, the idea of an authentication middleware as an intervening component to multiple authentication techniques is proposed in [9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is argued that, [29] the issues to manage the identifiers and their corresponding credentials has become a difficult responsibility. The authors in [30] proposed an identity model to facilitate management of online identities [29] [14].…”
Section: Related Workmentioning
confidence: 99%
“…According to [14], government agencies, the military, corporations, financial institutions, hospitals, and other groups collect, process, and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyberattacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.…”
Section: Introductionmentioning
confidence: 99%