User authentication is an essential task to contribute to efficient security of IT systems. Innovative solutions abound and research is very active, but few actors are interested in the user experience considering all his/her digital interactions. Many promise to remedy the "password nightmare" by using hardware to strengthen security. Yet the promise of a universal, secure and simple authentication method is rarely fulfilled. In this context of multiple authentication factors, physiological biometrics are often mentioned as an alternative. However, these technologies are very controversial, particularly because of the non-respect of privacy risks and the non-revocability of this data. Behavioral biometrics, which are less intrusive and eas...
© 2016 IEEE. The adoption of Cloud computing involves many advantages in terms of flexibility, scala...
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose...
Our purpose with this thesis was to find biometric methods that can be used in access control of mob...
User authentication is an essential task to contribute to efficient security of IT systems. Innovati...
In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing t...
In this thesis, we design three new authentication mechanisms based on user identity. Therefore, we ...
There has been tremendous growth of mobile devices, which includes mobile phones, tablets etc. in re...
Dans cette thèse, nous concevons trois nouveaux mécanismes d'authentification basés sur l'identité d...
In this thesis we present a scheme for automating authentication based on social factors using mobil...
Nowdays, the Internet of Things (IoT) represents a major part of our daily lives. IoT includes awide...
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to acces...
This thesis focuses on the analysis and design of secure and privacy-preserving biometric deployment...
We propose a secure, robust, and low-cost biometric authentication system on the mobile personal dev...
RÉSUMÉ: L'authentification biométrique telle que les empreintes digitales et la biométrie faciale a ...
This work addresses fundamental and challenging user authentication and universal identity issues an...
© 2016 IEEE. The adoption of Cloud computing involves many advantages in terms of flexibility, scala...
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose...
Our purpose with this thesis was to find biometric methods that can be used in access control of mob...
User authentication is an essential task to contribute to efficient security of IT systems. Innovati...
In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing t...
In this thesis, we design three new authentication mechanisms based on user identity. Therefore, we ...
There has been tremendous growth of mobile devices, which includes mobile phones, tablets etc. in re...
Dans cette thèse, nous concevons trois nouveaux mécanismes d'authentification basés sur l'identité d...
In this thesis we present a scheme for automating authentication based on social factors using mobil...
Nowdays, the Internet of Things (IoT) represents a major part of our daily lives. IoT includes awide...
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to acces...
This thesis focuses on the analysis and design of secure and privacy-preserving biometric deployment...
We propose a secure, robust, and low-cost biometric authentication system on the mobile personal dev...
RÉSUMÉ: L'authentification biométrique telle que les empreintes digitales et la biométrie faciale a ...
This work addresses fundamental and challenging user authentication and universal identity issues an...
© 2016 IEEE. The adoption of Cloud computing involves many advantages in terms of flexibility, scala...
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose...
Our purpose with this thesis was to find biometric methods that can be used in access control of mob...