Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
| Main Author: | Mohd Shahman , Samsul Ambia |
|---|---|
| Format: | Thesis |
| Published: |
2002
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/8403/ http://studentsrepo.um.edu.my/8403/1/password_authentication_using_biometric_function.pdf |
Similar Items
Automated Measurement Device / Nina Syahira Shahman
by: Shahman, Nina Syahira
Published: (2020)
by: Shahman, Nina Syahira
Published: (2020)
Analisis kontrastif struktur asas ayat bahasa Arab dan Melayu / Baharuddin Shahman
by: Baharuddin, Shahman
Published: (2012)
by: Baharuddin, Shahman
Published: (2012)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Customer satisfaction and perception towards the service provided at
Tenaga Nasional Berhad Distribution Tampin / Norafidah Ambia
by: Ambia, Norafidah
Published: (2001)
by: Ambia, Norafidah
Published: (2001)
Voice to text conversion app with speaker recognition
by: Ang, Sea Zhe
Published: (2022)
by: Ang, Sea Zhe
Published: (2022)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
The challenges facing by expatriate – a case study in Maju Holdings Sdn Bhd / Azizul Syawal Idham Shamsul Ambia
by: Shamsul Ambia, Azizul Syawal Idham
Published: (2010)
by: Shamsul Ambia, Azizul Syawal Idham
Published: (2010)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Diamond building in achieving green building concept / Shamsul Ashraf Samsul Bahri
by: Samsul Bahri, Shamsul Ashraf
Published: (2013)
by: Samsul Bahri, Shamsul Ashraf
Published: (2013)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
by: A. Rashid, Rozeha, et al.
Published: (2008)
by: A. Rashid, Rozeha, et al.
Published: (2008)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Kesepaduan personaliti dalam kalangan pelajar sarjana muda pendidikan IPTA di Malaysia / Samsul Aripin
by: Samsul, Aripin
Published: (2016)
by: Samsul, Aripin
Published: (2016)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
A descriptive study on “Istana Besar” design of architecture as an iconic building in Johor / Shahril Amri Samsul Kamal
by: Samsul Kamal, Shahril Amri
Published: (2019)
by: Samsul Kamal, Shahril Amri
Published: (2019)
Moment Analysis In Biometric-Based Authentication Systems
by: Pang, Ying Han
Published: (2005)
by: Pang, Ying Han
Published: (2005)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Penyelenggaraan bangunan : perbandingan di antara Bangunan Pintar dan Konvensional / Wan Samsul Zamani Wan Hamdan
by: Wan Hamdan, Wan Samsul Zamani
Published: (2000)
by: Wan Hamdan, Wan Samsul Zamani
Published: (2000)
System login authentication using voice recognition and ai methods / Metrius Benedict Sunggoh
by: Metrius, Benedict Sunggoh
Published: (2003)
by: Metrius, Benedict Sunggoh
Published: (2003)
A study on awareness level of quantity surveying profession among secondary school students/ Afiqah Iliyana Samsul Bahari
by: Samsul Bahari, Afiqah Iliyana
Published: (2020)
by: Samsul Bahari, Afiqah Iliyana
Published: (2020)
Development of smart talking plant with voice recognition function
by: Zaragoza, Mechelle Grace, et al.
Published: (2017)
by: Zaragoza, Mechelle Grace, et al.
Published: (2017)
Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Study On The Template Protection Technique In Biometric Authentication System
by: Ong, Thian Song
Published: (2008)
by: Ong, Thian Song
Published: (2008)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
A hybrid cryptosystem for biometric authentication and template protection
by: Jegede, Abayomi Joshua
Published: (2017)
by: Jegede, Abayomi Joshua
Published: (2017)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Photoplethysmogram based biometric recognition for twins
by: Mohammed Nadzr, Nur Izzati, et al.
Published: (2016)
by: Mohammed Nadzr, Nur Izzati, et al.
Published: (2016)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
An application of biometric technology : Iris recognition
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
Similar Items
-
Automated Measurement Device / Nina Syahira Shahman
by: Shahman, Nina Syahira
Published: (2020) -
Analisis kontrastif struktur asas ayat bahasa Arab dan Melayu / Baharuddin Shahman
by: Baharuddin, Shahman
Published: (2012) -
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013) -
Customer satisfaction and perception towards the service provided at
Tenaga Nasional Berhad Distribution Tampin / Norafidah Ambia
by: Ambia, Norafidah
Published: (2001) -
Voice to text conversion app with speaker recognition
by: Ang, Sea Zhe
Published: (2022)