Authentic brain waves improve driver security

One-time entry authentication methods, such as passwords, iris scanners and fingerprint recognition are fine for simple entry whether to a protected building or a private web page. But, a continuous biometric system is needed ...

Individual typing style gives key to user authentication

Your typing style is as individual as your fingerprints. Being able to use typing style to identify a change in users could be a vital security and forensic support for organisations such as banks, the military and universities, ...

Head for the clouds, feet firmly on the ground

Computer engineers in the US writing in the International Journal of Communication Networks and Distributed Systems have reviewed the research literature to get a clear picture of cloud computing, its adoption, use and the ...

Facebook for scientists: Map your expertise

(PhysOrg.com) -- Indiana University has received more than $1.8 million from the National Institutes of Health to collaborate on a $12.2 million, seven-university project designed to network researchers around the country.

page 2 from 2