From “occasional & intentional” to “continuous & passive” authentication
(Part VI in a series on Behavioral Biometrics) We can witness a strong surge in the ability of our tools and devices and the software powering them to authenticate a [...]
(Part VI in a series on Behavioral Biometrics) We can witness a strong surge in the ability of our tools and devices and the software powering them to authenticate a [...]
(Part V in a series on Behavioral Biometrics.) In daily life the term “identification” is often used liberally when in a technical sense we are pointing at “authentication”. The main [...]
(Part IV in a series on biometrics) We can recognize human faces and voices tremendously well. Even then, we regularly are making mistakes or are being deceived by our own [...]
(Part II in a series on behavioral biometrics) On the side of a little inquiry I am making at the moment into the developing concept of “identity in the digital [...]
(Part I in a series on behavioral biometrics) The various types of biometrics have been lingering above our networked societies as its continuous technological development promises secure, easy and cost [...]