Reviewed: The Face Authentication Processes for Accessing Cloud Computing Services using iPhone
Presently, there are several IT services that provide services for convenient access. Users can access those services by local access or remote access from anytime or anywhere including services which are on cloud computing system. Furthermore, mobile devices are very more widely used in our society...
Main Authors: | Sorapak Pukdesree, Paniti Netinant |
---|---|
Format: | Article |
Language: | English |
Published: |
UIKTEN
2018-08-01
|
Series: | TEM Journal |
Subjects: | |
Online Access: | http://www.temjournal.com/content/73/TemJournalAugust2018_475_479.pdf |
Similar Items
-
Biometrics Identification based Face Image Authentication
by: Israa Khidher, et al.
Published: (2009-09-01) -
Face Recognition Using Popular Deep Net Architectures: A Brief Comparative Study
by: Tony Gwyn, et al.
Published: (2021-06-01) -
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
by: Ghazel Albakri, et al.
Published: (2019-04-01) -
Face Recognition at a Distance for a Stand-Alone Access Control System
by: Hansung Lee, et al.
Published: (2020-01-01) -
Analysis of methods and technologies of human face recognition
by: Olga Nechyporenko, et al.
Published: (2017-09-01)