This article presents proposition of using quantum cryptography protocols in authentication process. Model is based on BB84 protocol. It is certain that protocol needs a little modification but most fundamental features are kept. Article presents an example model of authentication process.
This article presents approach and experiment involving experts' knowledge in investment databases. Presented approach indicates a way of use of AI in investment field of interest.
In the article problem of securing distributed biometric authentication system was discussed. After introduction to biometric domain, the key issues connected with secure communication in distributed authentication environments were briefly described. In this work a concept of enhancement of biometric authentication system by application of quantum… (More)
This paper presents a new approach in evaluation of biometric identity verification system, which is based on three important indicators: false acceptance rate, false reject rate and failure to enroll rate. Those mentioned indicators are grouped by using fuzzy sets and linguistic variables to provide important pieces of information.
In the paper we present a novel approach to logical access control to secured repository or container by integration of methods related to cryptography, steganography and biometrics.
In this article we propose the novel approach related to detection false biometric data which relies on analyses of templates instead of fingerprint images.
This paper is the introduction for further searching of the best solution for choice of threshold value in biometrical authentication system. That is one of the most important problems in a practical point of view. The most suitable solution of that problem can be reached by using different mathematical apparatus. At the beginning we consider mulicriteria… (More)