Biometrics Data Security Techniques for Portable Mobile Devices

被引:0
|
作者
S. Roy
S. Matloob
A. Seetharam
A. Rameshbabu
W. C. O’Dell
W. I. Davis
机构
[1] University of North Florida,
[2] SUNY Binghamton,undefined
[3] Johnson & Johnson Vision Care Inc.,undefined
来源
INAE Letters | 2017年 / 2卷 / 3期
关键词
Biometrics; Multi-factor authentication; Mobile clients;
D O I
10.1007/s41403-017-0026-8
中图分类号
学科分类号
摘要
In this work, a specific case-study of the development of a biometric authentication system for mobile clients (iPads) has been reported. The case-study addresses specific questions involving the technologies used, and provides a comparison of various products offered or developed by different vendors to implement such a system. We believe this work will help both researchers and developers who want to develop and experiment with similar biometric authentication systems—a form of multi-factor authentication gradually gaining usage.
引用
收藏
页码:123 / 131
页数:8
相关论文
共 50 条
  • [21] Self-Encryption Scheme for Data Security in Mobile Devices
    Chen, Yu
    Ku, Wei-Shinn
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 850 - +
  • [22] Security model for the protection of sensitive and confidential data on mobile devices
    Asghar, M. Tayyab
    Riaz, Muhammad
    Ahmad, Jamil
    Safdar, Sohail
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 198 - +
  • [23] Mobile Security Education on Portable Labs
    Lo, Dan Chia-Tien
    Qian, Kai
    Chen, Wei
    FRONTIERS IN EDUCATION CONFERENCE (FIE), 2015, 2015, : 421 - 424
  • [24] Continuous authentication on mobile devices using behavioral biometrics
    Dybczak, Jakub
    Nawrocki, Piotr
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 1028 - 1035
  • [25] Strengths, Weaknesses and Recommendations in Implementing Biometrics in Mobile Devices
    Sanchez-Reillo, Raul
    Sierra-Ramos, Daniel
    Estrada-Casarrubios, Roberto
    Amores-Duran, Jose A.
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [26] Implementing Biometrics-Based Authentication for Mobile Devices
    Abeni, Paolo
    Baltatu, Madalina
    D'Alessandro, Rosalia
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [27] A Review of Data Security and Cryptographic Techniques in IoT based devices
    Mustafa, Ghulam
    Ashraf, Rehan
    Mirza, Muhammad Ayzed
    Jamil, Abid
    Muhammad
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [28] Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey
    Liu Q.
    Li T.
    Yu Y.
    Cai Z.
    Zhou T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55 (01): : 14 - 29
  • [29] Devices and techniques for low-power portable devices
    Pritchett, S.
    R.F.Design, 20 (09):
  • [30] Overview of Security on Mobile Devices
    Aron, Lukas
    Hanacek, Petr
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,