[HTML][HTML] Multi-factor authentication: A survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …
enablers to maintain this process secure is authentication. It covers many different areas of a …
[HTML][HTML] A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
The human face is considered the prime entity in recognizing a person's identity in our
society. Henceforth, the importance of face recognition systems is growing higher for many …
society. Henceforth, the importance of face recognition systems is growing higher for many …
The ethics of algorithms: key problems and solutions
Research on the ethics of algorithms has grown substantially over the past decade.
Alongside the exponential development and application of machine learning algorithms …
Alongside the exponential development and application of machine learning algorithms …
A survey of 3d ear recognition techniques
Human recognition with biometrics is a rapidly emerging area of computer vision. Compared
to other well-known biometric features such as the face, fingerprint, iris, and palmprint, the …
to other well-known biometric features such as the face, fingerprint, iris, and palmprint, the …
[HTML][HTML] The use of biometric technology at airports: The case of customs and border protection (CBP)
N Khan, M Efthymiou - … Journal of Information Management Data Insights, 2021 - Elsevier
Biometrics in an airport environment can provide a contactless way of identity verification.
US Department of Homeland Security (DHS) has been trialling and implementing the …
US Department of Homeland Security (DHS) has been trialling and implementing the …
Reversing the irreversible: A survey on inverse biometrics
M Gomez-Barrero, J Galbally - Computers & Security, 2020 - Elsevier
With the widespread use of biometric recognition, several issues related to the privacy and
security provided by this technology have been recently raised and analysed. As a result …
security provided by this technology have been recently raised and analysed. As a result …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
[HTML][HTML] Continuous user identification in distance learning: a recent technology perspective
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …
COVID-19 global pandemic has raised several concerns about the credibility of online …
A truly self-sovereign identity system
Existing digital identity management systems fail to deliver the desirable properties of control
by the users of their own identity data, credibility of disclosed identity data, and network-level …
by the users of their own identity data, credibility of disclosed identity data, and network-level …
Fixing state vision: Interoperability, biometrics, and identity management in the EU
M Leese - Geopolitics, 2022 - Taylor & Francis
Building on Scott's notion of identity as a key concept in early modern statehood, this paper
historically contextualises and analyses the current political re-problematisation of identity in …
historically contextualises and analyses the current political re-problematisation of identity in …