Now showing items 1-4 of 4
Hardware-Based Security and Trust For IoT and Supply Chain Authentication
(Georgia Institute of Technology, 2017-04-21)
New hardware architectures for Internet-of-Things (IoT) are emerging rapidly in response to con- sumer demands for improved situational awareness, instant access to widely distributed sources of news and information and ...
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System
(Georgia Institute of Technology, 2018-03-02)
Facial/voice-based authentication is becoming increasingly popular (e.g., already adopted by MasterCard and AliPay), because it is easy to use. In particular, users can now authenticate themselves to online services by ...
(Georgia Institute of Technology, 2018-04-12)
More organizations are turning to facial and voice recognition, or other biometric identifiers, to authenticate users and grant access to their systems. In particular, some services (e.g. Mastercard Identity Check) allow ...
Device Enhanced Authentication: Passwords and Second Factors
(Georgia Institute of Technology, 2019-01-11)
Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification numbers - PINs). However, ...