Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Collaborative Biometric Technology

Handbook of Research on Social and Organizational Liabilities in Information Security
It’s an authentication biometric authentication technology that requires the user’s volunteer and intended participation in the process. It opposes to the stealth biometric technologies that can be used without the user’s consent.
Published in Chapter:
Using Technology to Overcome the Password's Contradiction
Sérgio Tenreiro de Magalhães (Universidade Católica Portuguesa, Portugal), Kenneth Revett (University of Westminster, UK), Henrique M.D. Santos (Universidade do Minho, Portugal), Leonel Duarte dos Santos (Universidade do Minho, Portugal), André Oliveira (Universidade do Minho, Portugal), and César Ariza (Bogomovil Ltda, Portugal)
DOI: 10.4018/978-1-60566-132-2.ch024
Abstract
The traditional approach to security has been the use of passwords. They provide the system with a barrier to access what was quite safe in the analogical world. The digital era provided the means to easily try thousands of passwords in a short period of time and now the password schema is no longer safe. Now it suffers of the password’s contradiction: the fact that it requires both simplicity and complexity to be usable and safe. Being so, new technologies are required that can preserve the easiness of use, but can provide stronger authentication processes. This chapter presents the latest advances in three technologies that can be used, unaided or together, to improve the safety of user/password schemas without significant changes in the protected information system architecture, despite the human factors that traditionally reduce the security of those systems. The presented technologies are Keystroke Dynamics, Graphical Authentication and Pointer Dynamic.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Behavioral Based Technologies for Enhancement of Login/Password Systems
An authentication biometric authentication technology that requires the user’s volunteer and intended participation in the process. It opposes to the stealth biometric technologies that can be used without the user’s consent.
Full Text Chapter Download: US $37.50 Add to Cart
Keystroke Dynamics and Graphical Authentication Systems
It is a biometric authentication technology that requires the user’s voluntary and intended participation in the process. It opposes the stealth biometric technologies that can be used without the user’s consent.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR