Articles with "authentication system" as a keyword



Photo by campaign_creators from unsplash

A blockchain‐based privacy‐preserving authentication system for ensuring multimedia content integrity

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22830

Abstract: With the prevalence of digital cameras, multimedia data have been used to record facts and provide evidence of events. However, the integrity of multimedia data is vulnerable to attacks with the proliferation of data tampering… read more here.

Keywords: multimedia content; multimedia data; multimedia; integrity ... See more keywords
Photo by averey from unsplash

Cancelable biometric authentication system based on ECG

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6300-2

Abstract: Biometrics are widely deployed in various security systems; however, they have drawbacks in the form of leakage or stealing, therefore numerous solutions have been proposed to secure biometric template such as cancelable biometric, which is… read more here.

Keywords: system; cancelable biometric; based ecg; system based ... See more keywords
Photo from wikipedia

On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3050402

Abstract: A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various… read more here.

Keywords: secure; system global; authentication; authentication system ... See more keywords
Photo by harpreetkaka from unsplash

An Effective Multi-Mode Iris Authentication System on a Microprocessor-FPGA Heterogeneous Platform With QC-LDPC Codes

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3133908

Abstract: With the emergence and popularity of iris biometrics, there are increasing concerns regarding the feasibility of iris authentication systems and their corresponding variability reduction methods. The former issues are typically addressed by optimizing key factors,… read more here.

Keywords: iris authentication; microprocessor fpga; authentication system; authentication ... See more keywords
Photo by dulhiier from unsplash

AKMA: Delegated Authentication System of 5G

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Communications Standards Magazine"

DOI: 10.1109/mcomstd.101.2100015

Abstract: Authentication and key management for applications (AKMA) is the new cellular-network-based delegated authentication system of 5G. In this article, we explain what a delegated authentication system is and how it relates to concepts like federated… read more here.

Keywords: authentication; cellular network; delegated authentication; authentication system ... See more keywords
Photo from wikipedia

A Two-Stage Feature Transformation-Based Fingerprint Authentication System for Privacy Protection in IoT

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3101208

Abstract: The significant and rapid development of the Internet of Things (IoT) in recent years has greatly benefited people's lives. However, there are serious security and privacy concerns that need to be addressed when using the… read more here.

Keywords: system; fingerprint; authentication; privacy ... See more keywords
Photo by averey from unsplash

Development of an Authentication System Using Voice Verification

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Communications Technology and Electronics"

DOI: 10.1134/s1064226920120013

Abstract: The amount of digital information is growing every year. Various identification and verification systems are used to access them. Most of them require a special key (for example, a password), which can easily be lost… read more here.

Keywords: voice; system using; verification; development authentication ... See more keywords
Photo by anniespratt from unsplash

A Hierarchical Authentication System for Access Equipment in Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "International Journal of Intelligent Systems"

DOI: 10.1155/2023/8899697

Abstract: With the development of Internet of Things (IoT) technology, massive heterogeneous equipment involving all walks of life has been connected to networks. However, many current authentication methods have poor robustness and cannot ensure the safety… read more here.

Keywords: authentication; hierarchical authentication; equipment; access equipment ... See more keywords
Photo from wikipedia

Mobile terminal identity authentication system based on behavioral characteristics

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/1550147719899371

Abstract: We propose a new type of authentication system based on behavioral characteristics for smartphone users. With the sensor and touch screen data in the smartphone, the combination of the motion state detection mode and the… read more here.

Keywords: system; based behavioral; authentication; system based ... See more keywords
Photo from wikipedia

Biometric authentication system based on texture features of retinal images

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Biometrics"

DOI: 10.1504/ijbm.2018.10014570

Abstract: In biometric authentication system, distinct set of characteristic features are used to identify an authorised person. Retina is a stable biometric feature because of its location and unique physiological characteristics. In this paper, we propose… read more here.

Keywords: texture features; system; authentication; biometric authentication ... See more keywords