Shakeunlock: Securely transfer authentication states between mobile devices

RD Findling, M Muaaz, D Hintze… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
As users start carrying multiple mobile devices, we propose a novel, token based mobile
device unlocking approach. Mobile devices are conjointly shaken to transfer the …

[PDF][PDF] An Assessment of Risk Management in Digitalization of Facilities Management in South Africa

AA Nngidi - 2023 - ujcontent.uj.ac.za
Facilities management (FM)“is evolving as a consequence of the introduction of new
technologies that can enhance the capabilities of roles devoted to the management of …

[PDF][PDF] Fingerprint image classification and retrieval using statistical methods

SP Vegad - Gujarat Technological University …, 2018 - gtusitecirculars.s3.amazonaws.com
Human fingerprints are popular biometrics due to its characteristics like universality,
uniqueness, permanence, collectability and acceptability. Fingerprints are rich in details …

User Authentication using Password and Hand Gesture with Leap Motion Sensor

MA Hassan, Q Shadman, MH Chowdhury… - … , Data Science and …, 2021 - Springer
User authentication is becoming a significant factor in the field of modern technology. It is a
process that permits a device to confirm the recognition of somebody who interfaces with a …

Brain-Based Authentication Systems and Brain Liveness Problem

MJS Esfahani - 2021 - search.proquest.com
In recent years, brain signals have gained attention as a potential trait for biometric-based
security systems and laboratory systems have been designed. A real-world brain-based …

I Am (Still) Here!

I Albano, D Gonçalves - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Students must be accounted for in a classroom environment, and there are several methods
to ensure student checking. Traditionally, attendance can be done with paper-based …

A QR® Code Authentication Scheme for Signature Hiding

I OMOFAYE, SA Onashoga, DO Aborisade… - 2023 - researchsquare.com
The use of QR CODE to code to hide vital and confidential information and data ranging
from the URL to online database and website, bio-data, name of an individual, password …

[PDF][PDF] DECENTRALIZOVANÝ BIOMETRICKÝ AUTENTIZAČNÍ SYSTÉM

PM JACKO - theses.cz
The goal of this thesis is to design and implement biometric authentication system, which
allows for biometric data storage integrity violation detection. This thesis also includes …

EEG human biometric authentication using eye blink artefacts

TT Madile - 2021 - search.proquest.com
This study proposes a new electroencephalography (EEG) biometric authentication for
humans based on eye blinking signals extracted from brainwaves. The brainwave signal …

A Framework Assessing the Effect of User Emotions on Touch Gesture Behavioural Biometric Authentication

R Abdulsalam, AM Zeki - 2019 IEEE 6th International …, 2019 - ieeexplore.ieee.org
Smartphone security constitutes a necessary requirement due to the sensitive information
they contain and the important tasks they perform. Behavioral biometric technology such as …