81 research outputs found

    iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric

    Get PDF
    With the growing number of smartcard applications there comes an increasing need to restrict access to the card itself. In previous work we proposed the pressure sequence biometric, within which a biometric sensor is integrated onto the card in a low-cost and mechanically compliant manner. Using an off-card verifier we demonstrated reasonable discrimination between users. In this paper we consider a number of on-card verification schemes, the best of which offers an equal error rate of 2.3%. On-card computational time requirements were found to be 3.1 seconds for enrolment and 0.12 seconds for verification. Incorporating our implementation into an existing applet used 684 bytes of program space. Whilst data memory requirements are estimated to be 1400 and 300 bytes for enrolment and verification, respectively. These time and size requirements demonstrate our biometric as a practical proposition for the protection of smart cards. Experiments were performed with the iButton's Java Card platform

    Continuous and transparent multimodal authentication: reviewing the state of the art

    Get PDF
    Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner

    Creative aspiration and the betrayal of promise? The experience of new creative workers

    Get PDF
    The promise of ‘doing what you love’ continues to attract new aspirants to creative work, yet most creative industries are so characterised by low investment, shifting foci and ongoing technological innovation that all promises must be unreliable. Some would-be creative workers negotiate their own pathways from the outset, ‘following their dream’ as they attempt to convert personal enthusiasms and amateur activities into income-earning careers. Others look to the proliferation of available training and education options, including higher education courses, as possible pathways into creative work. This chapter reviews recent research from the USA, Australia and the UK on the effectiveness – or otherwise – of higher education as preparation for a creative career. The chapter discusses the obstacles that many creative workers, including graduates, encounter on their creative pathways, for instance, as a result of informal work practices and self-employment. The chapter also looks at sources of advantage and disadvantage, such as those associated with particular geographic locations or personal identities. The chapter concludes by introducing the subsequent chapters in the collection. These critically explore the experience of new creative workers in a wide range of national contexts including Australia, Belgium, China, Ireland, Italy, Finland, the Netherlands, Russia and the United Kingdom

    Deontic Justice and Organizational Neuroscience

    Full text link

    Privacy considerations for a pervasive eye tracking world

    No full text

    Extending use cases throughout the software lifecycle

    No full text
    corecore