Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Chaudhry et al., 2018 - Google Patents

Discovering trends for the development of novel authentication applications for dementia patients

Chaudhry et al., 2018

View PDF
Document ID
17159933694726551247
Author
Chaudhry J
Farmand S
Islam S
Islam M
Hannay P
Valli C
Publication year
Publication venue
International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence

External Links

Snippet

We aim at creating ease in authentication process through non-password-based authentication scheme for the Dementia patients. The chronic neuro-degenerative disease leaves the patients with memory recall/loss issues. With ever growing rich list of assistive …
Continue reading at www.researchgate.net (PDF) (other versions)
  • 206010012289 Dementia 0 title abstract description 16

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/222Studio circuitry; Studio devices; Studio equipment; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, TV cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
    • H04N5/225Television cameras; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
    • H04N5/232Devices for controlling television cameras, e.g. remote control; Control of cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, TV cameras, video cameras, camcorders, webcams, camera modules for embedding in, e.g. mobile phones, computers or vehicles
    • H04N5/23219Control of camera operation based on recognized human faces, facial parts, facial expressions or other parts of the human body
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects

Similar Documents

Publication Publication Date Title
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
US9411950B1 (en) Methods and systems for user authentication in a computer system using image-based log-ins
Alt et al. Emerging trends in usable security and privacy
Wang et al. Verification Grid and Map Slipping Based Graphical Password against Shoulder‐Surfing Attacks
Shuwandy et al. Sensor-Based Authentication in Smartphone; a Systematic Review
Vaithyasubramanian et al. A scheme to create secured random password using markov chain
JP7021790B2 (en) Providing access to structured stored data
Fatima et al. A novel text-based user authentication scheme using pseudo-dynamic password
Chaudhry et al. Discovering trends for the development of novel authentication applications for dementia patients
Abraheem et al. Survey of various graphical password techniques and their schemes
Zimmermann et al. Keep on rating–on the systematic rating and comparison of authentication schemes
Zimmermann¹ et al. The quest to replace passwords revisited–rating authentication schemes
Dasgupta et al. Authentication Basics: Key to the kingdom–Access a Computing System
Wang et al. Analysis of multi-attribute user authentication to against man-in-the-room attack in virtual reality
Rawat et al. Conversational Artificial Intelligence
Usmani et al. New text-based user authentication scheme using CAPTCHA
Wills The Official (ISC) 2 SSCP CBK Reference
Huan et al. Authentication in E-learning systems: Challenges and Solutions
Rajarajan et al. GRAMAP: Three stage graphical password authentication scheme.
Vaithyasubramanian et al. Access to Network Login by Three‐Factor Authentication for Effective Information Security
Rawal et al. Manage the Identification and Authentication of People, Devices, and Services
Ayannuga Olanrewaju et al. Graphic-text authentication of a window-based application
Ray et al. GPOD: an efficient and secure graphical password authentication system by fast object detection
Su et al. User biometric information‐based secure method for smart devices
Ling et al. A case study of usable security: Usability testing of android privacy enhancing keyboard