Personal identification number

Known as: PIN, PIN number, Personal identification numbers 
A personal identification number (PIN, pronounced "pin"; often redundantly PIN number) is a numeric password used to authenticate a user to a system… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
We report the development of a new modality of personal identification application based on a brain-computer interface (BCI… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
This paper discusses an analysis of human iris patterns for recognition of biometric system which consists of a segmentation… (More)
  • figure 1.1
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
This paper introduces the Graphite open-source distributed parallel multicore simulator infrastructure. Graphite is designed from… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We propose a method of personal identification based on finger-vein patterns. An image of a finger captured under infrared light… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Footsteps, with different shoes of heels, sneakers, leathers or even bare footed, will appear in different grounds of concrete… (More)
  • table I
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Biometrics-based personal identification is regarded as an effective method for automatically recognizing, with a high confidence… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
W A LT ER S IP SE R For this reason, more and more organizations are looking to automated identity authentication systems to… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Wei Shu David Zhang City University of Hong Kong Department of Computer Science Kowloon, Hong Kong E-mail: dapeng@cs.cityu.edu.hk… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
1 I n t r o d u c t i o n Today, computers are connected with other computers, and a world-wide network has been established… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?