A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A New Multimodal Approach for Password Strength Estimation—Part I: Theory and Algorithms
2017
IEEE Transactions on Information Forensics and Security
After more than two decades of research in the field of password strength estimation, one clear conclusion may be drawn: no password strength metric by itself is better than all other metrics for every ...
Building upon this certainty and also taking advantage of the knowledge gained in the area of information fusion, in this paper, we propose a novel multimodal strength metric that combines several imperfect ...
Following this objective, the present work has described a novel multimodal and adaptable method for the estimation of password strength. ...
doi:10.1109/tifs.2016.2636092
fatcat:2f7itpdaurhxhhh4fempxpb5ba
A Multimodal Metric for Password Strength Estimation
2017
International Journal of Recent Trends in Engineering and Research
A research on Password strength estimation always comes with the new approach for estimating a score indicating its strength, but there is no known single metrics which measures this strength for every ...
We have uncovered a new way that combines these metrics in one unique multimodal metric for password strength detection. ...
strength estimation algorithms presented above, into the final unique multimodal score SMULT I. ...
doi:10.23883/ijrter.2017.3531.no3hh
fatcat:6y6x2xh2d5bl5lzuffpwrmh2oa
Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study
2012
Applied Computational Intelligence and Soft Computing
We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. ...
Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation/testing took place with patterns from the same database which were not ...
Acknowledgments This work was supported in part by the EC under Contract FP6-026990 HUMABIO [3, 16] . I. G. ...
doi:10.1155/2012/242401
fatcat:gyxgmej4enf6zjc6kcpvegzqxe
Computer and Information Science, Vol. 2, No. 3, August 2009, all in one file, Part A
2009
Computer and Information Science
In addition, we would like to thanks all clients, supervisors and students in this study. ...
Acknowledgement The authors would like to express our appreciation to Software Engineering Project 1 course lecturers, from Universiti Utara Malaysia, Dr Azman Yasin and Dr Haslina Mohamad who have given ...
VTP domain has been encrypted, so someone haven't know the password or password is incorrect, switch will not be able to learn the news of VLAN. ...
doi:10.5539/cis.v2n3p0a
fatcat:of4yymadgnaclmcglxlt6vzf2e
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) Biometric Authentication System
2017
International Journal of Engineering Research and Applications
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person's identity. ...
Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi ...
I. ...
doi:10.9790/9622-0704031625
fatcat:uwjd7qlerbdb3kflwc73djyn7a
A Text Book Of Research Papers On Fingerprint Recognition & Hash Code Techniques
2018
Zenodo
This book also contains applications of Multifactor authentication model using Fingerprint Hash code, OTP and Password and compares this new model with existing similar systems. ...
This book contains research articles related to Fingerprint image enhancement, recognition and Hash code generation methods. ...
They also proposed a new method for ridge cleaning based on ridge positions. In order to validate endpoints and bifurcation, they used two novel approaches and related algorithm. ...
doi:10.5281/zenodo.1409464
fatcat:243353fegrfxji7jvxzmqg5sge
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks
2009
IEEE Transactions on Wireless Communications
In this framework, multimodal biometrics are used for continuous authentication, and intrusion detection is modeled as sensors to detect system security state. ...
We then use dynamic programming-based hidden Markov model scheduling algorithms to derive the optimal schemes for both intrusion detection and continuous authentication. ...
Acknowledgment We thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper. ...
doi:10.1109/twc.2009.071036
fatcat:lknlsgc6mzdjpa3r6pvikiy45i
Biometric pattern recognition using wide networks of gravity proximity measures
2018
Journal of Physics, Conference Series
A network of gravitational proximity measures was configured to recognize a person by the characteristics of voice and handwritten passwords reproducing. Comparatively low error rates are obtained. ...
A measure of proximity is proposed for calculating the 'attractive force' of the pattern to existing templates in the feature space, which can work with both strongly dependent features and with independent ...
We call this approach to pattern recognition by the 'attraction' method. The idea of using gravity theories in pattern recognition issues is not new. ...
doi:10.1088/1742-6596/1050/1/012082
fatcat:w2gdrtw76ncnpkdxklobklnmty
Response to Part II�Being Rhetorical When We Teach Intellectual Property and Fair Use
[chapter]
2011
Copy(write): Intellectual Property in the Writing Classroom
We see the opportunities that new technologies have for further democratizing knowledge. ...
Consistent with the wide ranging approaches characteristic of teaching and scholarship in writing across the curriculum, the series presents works that take divergent perspectives on working as a writer ...
The one-tiered approach: Institutions used precise language situating authors into one category (e.g., "employee"). 4. ...
doi:10.37514/per-b.2011.2355.2.14
fatcat:atwfonbxvndobero5uojltt4ga
AI-Assisted Authentication: State of the Art, Taxonomy and Future Roadmap
[article]
2022
arXiv
pre-print
AI helps break through the limitations of traditional algorithms and provides more efficient and flexible methods for solving problems. ...
With the emerging AI-assisted authentication schemes, our comprehensive survey provides an overall understanding on a high level, which paves the way for future research in this area. ...
For group authentication, [187] provided a method to secret share information. Integrated with Shannon's Information Theory, a multimode authenti-cation scheme has been proposed [170] . ...
arXiv:2204.12492v1
fatcat:vdeuhy63cvawjdhclricvkq42q
Bezpartochnyi M., Britchenko I., Vazov R. Agriculture in Bulgaria: from European Union accession to the COVID-19 pandemic/ Concepts, strategies and mechanisms of economic systems management in the context of modern world challenges: scientific monograph // VUZF University of Finance, Business and Entrepreneurship. – Sofia: VUZF Publishing House"St. Grigorii Bogoslov", 2021. –p. 187-206
2021
figshare.com
legal, informational, etc.) and successful adaptation to new realities. ...
Secondly, favorable climatic conditions are suitable for growing various crops and farm animals. ...
KTail implements an algorithmic approach. Markov is based on static and algorithmic approaches. The Markov algorithm is superior to both algorithms. ...
doi:10.6084/m9.figshare.14758665.v1
fatcat:y7dsjlt3wbgptk63qbalt4r4am
Signal Processing for Biometric Systems [DSP Forum]
2007
IEEE Signal Processing Magazine
The forum members bring their expert insights into issues such as biometric security, privacy, and multi biometric and fusion techniques. ...
This IEEE Signal Processing Magazine (SPM) forum discuses signal processing applications, technologies, requirements and standardization of biometric systems. ...
His research interests include signal processing, communications, biometric security, streaming media, estimation, information theory, queuing, and networking. He is a Member of the IEEE. ...
doi:10.1109/msp.2007.4317481
fatcat:wd62iilx4jdthbchkuyb7qgwla
Signal Processing for Biometric Systems [DSP Forum]
2007
IEEE Signal Processing Magazine
The forum members bring their expert insights into issues such as biometric security, privacy, and multi biometric and fusion techniques. ...
This IEEE Signal Processing Magazine (SPM) forum discuses signal processing applications, technologies, requirements and standardization of biometric systems. ...
His research interests include signal processing, communications, biometric security, streaming media, estimation, information theory, queuing, and networking. He is a Member of the IEEE. ...
doi:10.1109/msp.2007.905886
fatcat:gdrz5a2khnaxtonejy5zekcecq
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
2011
IEEE Transactions on Vehicular Technology
theory for data fusion. ...
Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in highsecurity mobile ad hoc networks (MANETs). ...
ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper. is ...
doi:10.1109/tvt.2010.2103098
fatcat:7k5jl4k32bbl7gcc3ae25zaobm
Distributed combined authentication and intrusion detection with data fusion in high security mobile ad-hoc networks
2010
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE
theory for data fusion. ...
Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in highsecurity mobile ad hoc networks (MANETs). ...
ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped to improve the quality of this paper. is ...
doi:10.1109/milcom.2010.5680201
fatcat:dt5mu6mkona5dijdmdud2pd4mm
« Previous
Showing results 1 — 15 out of 632 results