Authentication of Subjects and Devices Using Biometrics and Identity Management Systems for Persuasive Mobile Computing: A Survey Paper
- Publication Type:
- Conference Proceeding
- 2010 Fifth International Conference on Broadband and Biomedical Communications (IB2Com), 2010, pp. 1 - 6
- Issue Date:
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
With the advances in Information Technology (IT) there has been an increase in threats to the communication systems and its assets. One of the most important issues of all IP networks that integrate wireless and wired technologies is the applicability and performance of the electronic identification and authentication methods. These schemes employ a variety of technologies of different degrees of security. Biometrics technology nowadays is typically considered a security necessity, tightly coupled with the foundation of highly secure identification and authentication solutions. This article provides a short survey on different types of authentication and identity management systems. It attempts to describe a summary of related works including some of the latest schemes in face and fingerprint recognition. With a better understanding of electronic authentication techniques any organization can properly select and utilize the technologies which meet its needs.
Please use this identifier to cite or link to this item: