This HTML5 document contains 39 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n21http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n8http://purl.org/net/nknouf/ns/bibtex#
n10http://localhost/temp/predkladatel/
n7http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F09%3APU82623%21RIV10-MSM-26230___/
n18http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n6http://linked.opendata.cz/ontology/domain/vavai/
n17https://schema.org/
n12http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n19http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n20http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F09%3APU82623%21RIV10-MSM-26230___
rdf:type
n6:Vysledek skos:Concept
dcterms:description
Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It's not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and how new behavioral biometric suitable for this approach - visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it's suitable only for liveness testing or it's possible to us Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It's not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and how new behavioral biometric suitable for this approach - visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it's suitable only for liveness testing or it's possible to us
dcterms:title
Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication
skos:prefLabel
Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication
skos:notation
RIV/00216305:26230/09:PU82623!RIV10-MSM-26230___
n3:aktivita
n11:Z
n3:aktivity
Z(MSM0021630528)
n3:dodaniDat
n5:2010
n3:domaciTvurceVysledku
n18:6897770
n3:druhVysledku
n20:D
n3:duvernostUdaju
n13:S
n3:entitaPredkladatele
n7:predkladatel
n3:idSjednocenehoVysledku
347830
n3:idVysledku
RIV/00216305:26230/09:PU82623
n3:jazykVysledku
n19:eng
n3:klicovaSlova
VEP, biometrics, authentication<br>
n3:klicoveSlovo
n4:authentication%3Cbr%3E n4:VEP n4:biometrics
n3:kontrolniKodProRIV
[54B754716B13]
n3:mistoKonaniAkce
Venice/Mestre
n3:mistoVydani
Venice
n3:nazevZdroje
The Fourth International Conference on Internet Monitoring and Protection
n3:obor
n14:JC
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
2
n3:rokUplatneniVysledku
n5:2009
n3:tvurceVysledku
Malinka, Kamil
n3:typAkce
n21:WRD
n3:zahajeniAkce
2009-05-24+02:00
n3:zamer
n12:MSM0021630528
s:numberOfPages
6
n8:hasPublisher
IEEE Computer Society
n17:isbn
978-0-7695-3612-5
n10:organizacniJednotka
26230