Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








632 Hits in 6.8 sec

A New Multimodal Approach for Password Strength Estimation—Part I: Theory and Algorithms

Javier Galbally, Iwen Coisel, Ignacio Sanchez
2017 IEEE Transactions on Information Forensics and Security  
After more than two decades of research in the field of password strength estimation, one clear conclusion may be drawn: no password strength metric by itself is better than all other metrics for every  ...  Building upon this certainty and also taking advantage of the knowledge gained in the area of information fusion, in this paper, we propose a novel multimodal strength metric that combines several imperfect  ...  Following this objective, the present work has described a novel multimodal and adaptable method for the estimation of password strength.  ... 
doi:10.1109/tifs.2016.2636092 fatcat:2f7itpdaurhxhhh4fempxpb5ba

A Multimodal Metric for Password Strength Estimation

2017 International Journal of Recent Trends in Engineering and Research  
A research on Password strength estimation always comes with the new approach for estimating a score indicating its strength, but there is no known single metrics which measures this strength for every  ...  We have uncovered a new way that combines these metrics in one unique multimodal metric for password strength detection.  ...  strength estimation algorithms presented above, into the final unique multimodal score SMULT I.  ... 
doi:10.23883/ijrter.2017.3531.no3hh fatcat:6y6x2xh2d5bl5lzuffpwrmh2oa

Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study

I. G. Damousis, S. Argyropoulos
2012 Applied Computational Intelligence and Soft Computing  
We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system.  ...  Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testing took place with patterns from the same database which were not  ...  Acknowledgments This work was supported in part by the EC under Contract FP6-026990 HUMABIO [3, 16] . I. G.  ... 
doi:10.1155/2012/242401 fatcat:gyxgmej4enf6zjc6kcpvegzqxe

Computer and Information Science, Vol. 2, No. 3, August 2009, all in one file, Part A

CIS Editor
2009 Computer and Information Science  
In addition, we would like to thanks all clients, supervisors and students in this study.  ...  Acknowledgement The authors would like to express our appreciation to Software Engineering Project 1 course lecturers, from Universiti Utara Malaysia, Dr Azman Yasin and Dr Haslina Mohamad who have given  ...  VTP domain has been encrypted, so someone haven't know the password or password is incorrect, switch will not be able to learn the news of VLAN.  ... 
doi:10.5539/cis.v2n3p0a fatcat:of4yymadgnaclmcglxlt6vzf2e

The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) Biometric Authentication System

Afshan Ashraf, Isha Vats
2017 International Journal of Engineering Research and Applications  
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person's identity.  ...  Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi  ...  I.  ... 
doi:10.9790/9622-0704031625 fatcat:uwjd7qlerbdb3kflwc73djyn7a

A Text Book Of Research Papers On Fingerprint Recognition & Hash Code Techniques

K. Dr. Krishna Prasad
2018 Zenodo  
This book also contains applications of Multifactor authentication model using Fingerprint Hash code, OTP and Password and compares this new model with existing similar systems.  ...  This book contains research articles related to Fingerprint image enhancement, recognition and Hash code generation methods.  ...  They also proposed a new method for ridge cleaning based on ridge positions. In order to validate endpoints and bifurcation, they used two novel approaches and related algorithm.  ... 
doi:10.5281/zenodo.1409464 fatcat:243353fegrfxji7jvxzmqg5sge

Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks

Jie Liu, F. Richard Yu, Chung-Horng Lung, Helen Tang
2009 IEEE Transactions on Wireless Communications  
In this framework, multimodal biometrics are used for continuous authentication, and intrusion detection is modeled as sensors to detect system security state.  ...  We then use dynamic programming-based hidden Markov model scheduling algorithms to derive the optimal schemes for both intrusion detection and continuous authentication.  ...  Acknowledgment We thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper.  ... 
doi:10.1109/twc.2009.071036 fatcat:lknlsgc6mzdjpa3r6pvikiy45i

Biometric pattern recognition using wide networks of gravity proximity measures

A E Sulavko, S S Zhumazhanova
2018 Journal of Physics, Conference Series  
A network of gravitational proximity measures was configured to recognize a person by the characteristics of voice and handwritten passwords reproducing. Comparatively low error rates are obtained.  ...  A measure of proximity is proposed for calculating the 'attractive force' of the pattern to existing templates in the feature space, which can work with both strongly dependent features and with independent  ...  We call this approach to pattern recognition by the 'attraction' method. The idea of using gravity theories in pattern recognition issues is not new.  ... 
doi:10.1088/1742-6596/1050/1/012082 fatcat:w2gdrtw76ncnpkdxklobklnmty

Response to Part II�Being Rhetorical When We Teach Intellectual Property and Fair Use [chapter]

James E. Porter
2011 Copy(write): Intellectual Property in the Writing Classroom  
We see the opportunities that new technologies have for further democratizing knowledge.  ...  Consistent with the wide ranging approaches characteristic of teaching and scholarship in writing across the curriculum, the series presents works that take divergent perspectives on working as a writer  ...  The one-tiered approach: Institutions used precise language situating authors into one category (e.g., "employee"). 4.  ... 
doi:10.37514/per-b.2011.2355.2.14 fatcat:atwfonbxvndobero5uojltt4ga

AI-Assisted Authentication: State of the Art, Taxonomy and Future Roadmap [article]

Guangyi Zhu, Yasir Al-Qaraghuli
2022 arXiv   pre-print
AI helps break through the limitations of traditional algorithms and provides more efficient and flexible methods for solving problems.  ...  With the emerging AI-assisted authentication schemes, our comprehensive survey provides an overall understanding on a high level, which paves the way for future research in this area.  ...  For group authentication, [187] provided a method to secret share information. Integrated with Shannon's Information Theory, a multimode authenti-cation scheme has been proposed [170] .  ... 
arXiv:2204.12492v1 fatcat:vdeuhy63cvawjdhclricvkq42q

Bezpartochnyi M., Britchenko I., Vazov R. Agriculture in Bulgaria: from European Union accession to the COVID-19 pandemic/ Concepts, strategies and mechanisms of economic systems management in the context of modern world challenges: scientific monograph // VUZF University of Finance, Business and Entrepreneurship. – Sofia: VUZF Publishing House"St. Grigorii Bogoslov", 2021. –p. 187-206

Igor Britchenko, Maksym Bezpartochnyi, Vazov Radostin
2021 figshare.com  
legal, informational, etc.) and successful adaptation to new realities.  ...  Secondly, favorable climatic conditions are suitable for growing various crops and farm animals.  ...  KTail implements an algorithmic approach. Markov is based on static and algorithmic approaches. The Markov algorithm is superior to both algorithms.  ... 
doi:10.6084/m9.figshare.14758665.v1 fatcat:y7dsjlt3wbgptk63qbalt4r4am

Signal Processing for Biometric Systems [DSP Forum]

Anil Jain, Rama Chellappa, Stark Draper, Nasir Memon, P. Phillips, Anthony Vetro
2007 IEEE Signal Processing Magazine  
The forum members bring their expert insights into issues such as biometric security, privacy, and multi biometric and fusion techniques.  ...  This IEEE Signal Processing Magazine (SPM) forum discuses signal processing applications, technologies, requirements and standardization of biometric systems.  ...  His research interests include signal processing, communications, biometric security, streaming media, estimation, information theory, queuing, and networking. He is a Member of the IEEE.  ... 
doi:10.1109/msp.2007.4317481 fatcat:wd62iilx4jdthbchkuyb7qgwla

Signal Processing for Biometric Systems [DSP Forum]

Anil Jain, Rama Chellappa, Stark Draper, Nasir Memon, P. Phillips, Anthony Vetro
2007 IEEE Signal Processing Magazine  
The forum members bring their expert insights into issues such as biometric security, privacy, and multi biometric and fusion techniques.  ...  This IEEE Signal Processing Magazine (SPM) forum discuses signal processing applications, technologies, requirements and standardization of biometric systems.  ...  His research interests include signal processing, communications, biometric security, streaming media, estimation, information theory, queuing, and networking. He is a Member of the IEEE.  ... 
doi:10.1109/msp.2007.905886 fatcat:gdrz5a2khnaxtonejy5zekcecq

Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks

Shengrong Bu, F. Richard Yu, Xiaoping P. Liu, Peter Mason, Helen Tang
2011 IEEE Transactions on Vehicular Technology  
theory for data fusion.  ...  Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in highsecurity mobile ad hoc networks (MANETs).  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper. is  ... 
doi:10.1109/tvt.2010.2103098 fatcat:7k5jl4k32bbl7gcc3ae25zaobm

Distributed combined authentication and intrusion detection with data fusion in high security mobile ad-hoc networks

Shengrong Bu, F. Richard Yu, X. Liu Peter, Helen Tang, Peter Mason
2010 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE  
theory for data fusion.  ...  Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in highsecurity mobile ad hoc networks (MANETs).  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper. is  ... 
doi:10.1109/milcom.2010.5680201 fatcat:dt5mu6mkona5dijdmdud2pd4mm
« Previous Showing results 1 — 15 out of 632 results