- Full text PDF available (1)
- This year (0)
- Last 5 years (1)
- Last 10 years (9)
Journals and Conferences
This article presents proposition of using quantum cryptography protocols in authentication process. Model is based on BB84 protocol. It is certain that protocol needs a little modification but most fundamental features are kept. Article presents an example model of authentication process.
This paper presents a new approach in evaluation of biometric identity verification system, which is based on three important indicators: false acceptance rate, false reject rate and failure to enroll rate. Those mentioned indicators are grouped by using fuzzy sets and linguistic variables to provide important pieces of information.
In this article we propose the novel approach related to detection false biometric data which relies on analyses of templates instead of fingerprint images.
Over the past decade the technological achievements have resulted in improved network services. Because of electronic transactions are executed in these days, the security of computer access is relying important. Existing security techniques can be strengthen by behavioral biometrics such as keystroke dynamics which makes use of the typing cadence of an… (More)
In the paper we present a novel approach to logical access control to secured repository or container by integration of methods related to cryptography, steganography and biometrics.
This article presents approach and experiment involving experts' knowledge in investment databases. Presented approach indicates a way of use of AI in investment field of interest.
This paper is the introduction for further searching of the best solution for choice of threshold value in biometrical authentication system. That is one of the most important problems in a practical point of view. The most suitable solution of that problem can be reached by using different mathematical apparatus. At the beginning we consider mulicriteria… (More)
In the article problem of securing distributed biometric authentication system was discussed. After introduction to biometric domain, the key issues connected with secure communication in distributed authentication environments were briefly described. In this work a concept of enhancement of biometric authentication system by application of quantum… (More)