Privacy at work: A review and a research agenda for a contested terrain
Privacy in the workplace is a pivotal concern for employees and employers. Employees
expect to be in control of the personal information and access they provide to the …
expect to be in control of the personal information and access they provide to the …
Insights into materials, physics, and applications in flexible and wearable acoustic sensing technology
Z Lin, S Duan, M Liu, C Dang, S Qian… - Advanced …, 2024 - Wiley Online Library
Sound plays a crucial role in the perception of the world. It allows to communicate, learn,
and detect potential dangers, diagnose diseases, and much more. However, traditional …
and detect potential dangers, diagnose diseases, and much more. However, traditional …
Spoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …
the technology can be susceptible to malicious spoofing attacks. The research community …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Biometric antispoofing methods: A survey in face recognition
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …
pioneering works in face and voice recognition to the current state of development wherein a …
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
We investigate whether a classifier can continuously authenticate users based on the way
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
In biometric identification systems, the biometric database is typically stored in a trusted
server, which is also responsible for performing the identification process. However, a …
server, which is also responsible for performing the identification process. However, a …
A review of biometric technology along with trends and prospects
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …
possession based methods. A wide variety of biometric modalities have been tested so far …
A survey on biometric cryptosystems and cancelable biometrics
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …