Author:Tsague, HD; Nelwamondo, Fulufhelo V; Msimang, NDate:Nov 2012One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core ...Read more
Author:Mlambo, CS; Shabalala, MB; Nelwamondo, Fulufhelo VDate:Jan 2015In this paper, implementations of three Hough Transform based fingerprint alignment algorithms are analyzed with respect to time complexity on Java Card environment. Three algorithms are: Local Match Based Approach (LMBA), Discretized Rotation ...Read more
Author:Mlambo, S; Nelwamondo, Fulufhelo V; Mathekga, Mmamolatelo EDate:Mar 2015Smart cards are one of the most commonly used technologies that are integrated with fingerprints to develop higher security. One of the important uses of smart cards is the development of authentication systems for an individual. The demand ...Read more
Author:Nair, Kishor K; Helberg, A; Van der Merwe, Johannes JDate:Jul 2016The combination of smart cards and biometrics results in a strong 2-factor authentication. It facilitates a trusted credential for authenticating an individual’s identity through one-to-one biometric verification using the smart card token. ...Read more
Author:Baruni, Kedimotse P; Helberg, A; Nair, Kishor KDate:Dec 2016Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location ...Read more