Proof Beyond The Password

Smith, Brad
April 2004
Wireless Week;4/1/2004, Vol. 10 Issue 8, p10
Trade Publication
Provides information on several enhancements made to authentication methods and security measures used in the wireless communications industry in the U.S. Digital signatures; Biometrics; Subscriber identity module card; Speech voice recognition.


Related Articles

  • A Survey of Vein Recognition Techniques. Hao Luo; Fa-Xin Yu; Jeng-Shyang Pan; Shu-Chuan Chu; Pei-Wei Tsai // Information Technology Journal;2010, Vol. 9 Issue 6, p1142 

    No abstract available.

  • Efficient and Robust Multimodal Biometric System for Feature Level Fusion (Speech and Signature). Kaur, Dapinder; Kaur, Gaganpreet; Singh, Dheerendra // International Journal of Computer Applications;Aug2013, Vol. 75 Issue 1-17, p33 

    A Pattern can be characterized by more or less rich & varied pieces of information of different features. The fusion of these different sources of information can provide an opportunity to develop more efficient biometric system which is known as Multimodal biometric System. Multimodal...

  • Biometrics: Boon or Bust? Kerstetter, Jim; Spooner, John G. // PC Week;11/16/98, Vol. 15 Issue 46, p6 

    Focuses on biometric security products for computers. The slow acceptance of biometrics as of November 1998; Development by Veridicom Inc. of a fingerprint recognition module which connects via USB, PCMCIA or a parallel port; Keyboards from WhoVision Systems Inc. with fingerprint sensor...

  • Biometrics 101. Filippini, Steve // Sound & Video Contractor;Oct2005, Vol. 23 Issue 10, p36 

    Presents information on technological developments in the field of biometrics. Factors to consider in using fingerprint scanning as a method of biometric verification; Effectiveness of facial geometry analysis in the identification of an individual's facial features; Comparison between static...

  • @ the coalface. Parker, Tom // Computer Bulletin;Jan2003, Vol. 45 Issue 1, p34 

    Focuses on digital signatures. Risks involved in using digital signatures; Lack of useful context, variation in medium and history of risks; Comparison with handwritten signature.

  • Improving the Exact Security of Digital Signature Schemes. Micali, Silvio; Reyzin, Leonid // Journal of Cryptology;2002, Vol. 15 Issue 1, p1 

    We put forward a new method of constructing Fiat-Shamir-like signature schemes that yields better 'exact security' than the original Fiat-Shamir method. (We also point out, however, that such tight security does not make our modified schemes always preferable to the original ones. Indeed, there...

  • Guarding E-Documents And Identity.  // Futurist;Sep/Oct2001, Vol. 35 Issue 5, p17 

    Focuses on concerns regarding the security of digital signatures.

  • Multimodal Biometric Person Authentication: A Review. Sahoo, Soyuj Kumar; Choubisa, Tarun; Prasanna, S. R. Mahadeva // IETE Technical Review;Jan/Feb2012, Vol. 29 Issue 1, p54 

    This paper provides a review of multimodal biometric person authentication systems. The paper begins with an introduction to biometrics, its advantages, disadvantages, and authentication system using them. A brief discussion on the selection criteria of different biometrics is also given. This...

  • IARPA Issues RFI For Novel Biometric Signatures.  // Defense Daily;2/24/2010, Vol. 245 Issue 35, p6 

    The article reports that the Intelligence Advanced Research Project Agency (IARPA) has issued a Request for Information (RFI) for novel biometric signatures that exploit face, ocular, voice or speech modalities and can be captured by non-contact methods. The objective of IARPA is to maintain a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics