Smartphones are becoming more and more widespread and powerful and their use is becoming common in applications such as transport, healthcare, security, and surveillance. In this paper we describe the preliminary results of our experience in using an Android smartphone as a tool which can be used in emergency situations to validate the identity of people through the use of two functionalities provided by the most recent generations of smartphones: NFC and face recognition.JRC.G.6-Digital Citizen Securit
The Smart phones are capable of doing new kind of protection mechanism for sensitive data stored in ...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
AbstractIn today's world, smartphones are ubiquitous. Gone are the days when phones were synonymous ...
The current approach for person identification consists of handing over a paper ID document which co...
Smartphones play a key role in our daily life, they can replace our watch, calendar, and mail box bu...
Smartphone are becoming more deployed, and such as a way for identification and authentication. The ...
The quality of the smartphone’s camera enables us to capture high quality pictures at a high resolut...
The numbers of Smartphone users increasing day by day. Hence, there is need to propose advanced Grou...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Recent technological advancements have made face recognition a very viable identification and verif...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Abstract: Modern mobile devices have become very powerful. All kinds of sensitive data are stored an...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Identification technology has been widely developed today, such as fingerprint identification, palms...
Information security and verify the user's identity has become one of the biggest concerns of i...
The Smart phones are capable of doing new kind of protection mechanism for sensitive data stored in ...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
AbstractIn today's world, smartphones are ubiquitous. Gone are the days when phones were synonymous ...
The current approach for person identification consists of handing over a paper ID document which co...
Smartphones play a key role in our daily life, they can replace our watch, calendar, and mail box bu...
Smartphone are becoming more deployed, and such as a way for identification and authentication. The ...
The quality of the smartphone’s camera enables us to capture high quality pictures at a high resolut...
The numbers of Smartphone users increasing day by day. Hence, there is need to propose advanced Grou...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Recent technological advancements have made face recognition a very viable identification and verif...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Abstract: Modern mobile devices have become very powerful. All kinds of sensitive data are stored an...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Identification technology has been widely developed today, such as fingerprint identification, palms...
Information security and verify the user's identity has become one of the biggest concerns of i...
The Smart phones are capable of doing new kind of protection mechanism for sensitive data stored in ...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
AbstractIn today's world, smartphones are ubiquitous. Gone are the days when phones were synonymous ...