Authentication of Subjects and Devices Using Biometrics and Identity Management Systems for Persuasive Mobile Computing: A Survey Paper

Publication Type:
Conference Proceeding
2010 Fifth International Conference on Broadband and Biomedical Communications (IB2Com), 2010, pp. 1 - 6
Issue Date:
Full metadata record
Files in This Item:
Filename Description SizeFormat
2010001347OK.pdf604.68 kBAdobe PDF
With the advances in Information Technology (IT) there has been an increase in threats to the communication systems and its assets. One of the most important issues of all IP networks that integrate wireless and wired technologies is the applicability and performance of the electronic identification and authentication methods. These schemes employ a variety of technologies of different degrees of security. Biometrics technology nowadays is typically considered a security necessity, tightly coupled with the foundation of highly secure identification and authentication solutions. This article provides a short survey on different types of authentication and identity management systems. It attempts to describe a summary of related works including some of the latest schemes in face and fingerprint recognition. With a better understanding of electronic authentication techniques any organization can properly select and utilize the technologies which meet its needs.
Please use this identifier to cite or link to this item: