Sign Up to like & get
recommendations!
1
Published in 2022 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.22830
Abstract: With the prevalence of digital cameras, multimedia data have been used to record facts and provide evidence of events. However, the integrity of multimedia data is vulnerable to attacks with the proliferation of data tampering…
read more here.
Keywords:
multimedia content;
multimedia data;
multimedia;
integrity ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6300-2
Abstract: Biometrics are widely deployed in various security systems; however, they have drawbacks in the form of leakage or stealing, therefore numerous solutions have been proposed to secure biometric template such as cancelable biometric, which is…
read more here.
Keywords:
system;
cancelable biometric;
based ecg;
system based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3050402
Abstract: A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various…
read more here.
Keywords:
secure;
system global;
authentication;
authentication system ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3133908
Abstract: With the emergence and popularity of iris biometrics, there are increasing concerns regarding the feasibility of iris authentication systems and their corresponding variability reduction methods. The former issues are typically addressed by optimizing key factors,…
read more here.
Keywords:
iris authentication;
microprocessor fpga;
authentication system;
authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Communications Standards Magazine"
DOI: 10.1109/mcomstd.101.2100015
Abstract: Authentication and key management for applications (AKMA) is the new cellular-network-based delegated authentication system of 5G. In this article, we explain what a delegated authentication system is and how it relates to concepts like federated…
read more here.
Keywords:
authentication;
cellular network;
delegated authentication;
authentication system ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2021.3101208
Abstract: The significant and rapid development of the Internet of Things (IoT) in recent years has greatly benefited people's lives. However, there are serious security and privacy concerns that need to be addressed when using the…
read more here.
Keywords:
system;
fingerprint;
authentication;
privacy ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Communications Technology and Electronics"
DOI: 10.1134/s1064226920120013
Abstract: The amount of digital information is growing every year. Various identification and verification systems are used to access them. Most of them require a special key (for example, a password), which can easily be lost…
read more here.
Keywords:
voice;
system using;
verification;
development authentication ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "International Journal of Intelligent Systems"
DOI: 10.1155/2023/8899697
Abstract: With the development of Internet of Things (IoT) technology, massive heterogeneous equipment involving all walks of life has been connected to networks. However, many current authentication methods have poor robustness and cannot ensure the safety…
read more here.
Keywords:
authentication;
hierarchical authentication;
equipment;
access equipment ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/1550147719899371
Abstract: We propose a new type of authentication system based on behavioral characteristics for smartphone users. With the sensor and touch screen data in the smartphone, the combination of the motion state detection mode and the…
read more here.
Keywords:
system;
based behavioral;
authentication;
system based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Biometrics"
DOI: 10.1504/ijbm.2018.10014570
Abstract: In biometric authentication system, distinct set of characteristic features are used to identify an authorised person. Retina is a stable biometric feature because of its location and unique physiological characteristics. In this paper, we propose…
read more here.
Keywords:
texture features;
system;
authentication;
biometric authentication ... See more keywords