Articles with "authentication schemes" as a keyword



Photo by nathanayoola from unsplash

Continuous Multimodal Biometric Authentication Schemes: A Systematic Review

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3061589

Abstract: Building safeguards against illegitimate access and authentication is a cornerstone for securing systems. Existing user authentication schemes suffer from challenges in detecting impersonation attacks which leave systems vulnerable and susceptible to misuse. A range of… read more here.

Keywords: continuous multimodal; authentication; biometric authentication; multimodal biometric ... See more keywords
Photo by drew_hays from unsplash

Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues

Sign Up to like & get
recommendations!
Published in 2022 at "Applied Sciences"

DOI: 10.3390/app12157487

Abstract: The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet. IoMT devices collect patients’ medical data and share them… read more here.

Keywords: authentication; iomt; medical things; authentication schemes ... See more keywords