Sign Up to like & get
recommendations!
0
Published in 2020 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"
DOI: 10.1002/widm.1365
Abstract: The shortcomings of conventional access control systems for high‐security environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session,…
read more here.
Keywords:
biometrics advanced;
continuous authentication;
biometrics;
using biometrics ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2020.11.023
Abstract: Abstract Raising incidents of security threats among active sessions is an increasing concern in IoT environment. Continuous authentication was introducing to be superior to traditional authentication schemes by constantly verify users’ identities on an ongoing…
read more here.
Keywords:
continuous authentication;
iot continuous;
authentication;
cab iot ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3108822
Abstract: With the widespread usage of mobile devices, the authentication mechanisms are urgently needed to identify users for information leakage prevention. In this article, we present CAGANet, a convolutional neural network (CNN)-based continuous authentication on smartphones…
read more here.
Keywords:
authentication;
network;
based continuous;
cnn based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2025.3530775
Abstract: The increasing integration of Internet of Things (IoT) devices in various sectors has created complex and dynamically changing interconnected systems. In several multiauthority and multidomain applications, IoT devices may continuously change their connectivity status, leading…
read more here.
Keywords:
attestation;
authentication;
continuous authentication;
protocol ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2016.2622262
Abstract: Most computer systems authenticate users only once at the time of initial login, which can lead to security concerns. Continuous authentication has been explored as an approach for alleviating such concerns. Previous methods for continuous…
read more here.
Keywords:
caba continuous;
based bioaura;
continuous authentication;
authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3196270
Abstract: Currently, available contactless continuous authentication (CA) techniques depend on physiological biometrics to identify individuals at long intervals through complex feature extraction, resulting in poor accuracy, high computation costs, and security vacuums during lengthy intervals. To…
read more here.
Keywords:
authentication;
biometrics;
contactless continuous;
postural transition ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2025.3531197
Abstract: With the increasing digitization of medical records and the interconnected nature of healthcare networks, robust security measures are vital to mitigate the risk of data breaches, cyberattacks, and unauthorized access. Existing healthcare security models, like…
read more here.
Keywords:
biometrics;
authentication;
healthcare security;
continuous authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2024.3443208
Abstract: Continuous authentication (CA) based on wrist photoplethysmogram (PPG) has been increasingly studied, but still requires further extensive investigation on PPG reliability over time and heart rates for real-world deployments. In this paper, we first analyze…
read more here.
Keywords:
wrist photoplethysmogram;
across session;
authentication;
continuous authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2025.3553711
Abstract: In the Metaverse, continuous authentication is essential for verifying the ongoing connection between a user’s physical identity and avatar, ensuring secure access to various services. This process is crucial for confirming identities, maintaining security, and…
read more here.
Keywords:
authentication;
continuous authentication;
securing metaverse;
authentication framework ... See more keywords