Articles with "user authentication" as a keyword



Photo by finleydesign from unsplash

On applying support vector machines to a user authentication method using surface electromyogram signals

Sign Up to like & get
recommendations!
Published in 2017 at "Artificial Life and Robotics"

DOI: 10.1007/s10015-017-0404-z

Abstract: At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication… read more here.

Keywords: authentication method; surface electromyogram; support vector; user authentication ... See more keywords
Photo by hudsoncrafted from unsplash

An efficient certificateless user authentication and key exchange protocol for client-server environment

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0622-1

Abstract: Identity-based user authentication protocols have been presented to be applicable to resource-constrained devices such as mobile phones. Unfortunately, the previous protocols have the drawback of the key escrow problem. A new protocol of a user… read more here.

Keywords: protocol; user authentication; key exchange; client server ... See more keywords
Photo by bugsster from unsplash

Efficient user authentication protocol for distributed multimedia mobile cloud environment

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-019-01467-z

Abstract: The rapid growth of smart-phone users, mobile services and mobile applications, poses the challenges of storage space, processing capability, and battery lifetime at the users smart phones. Mobile cloud computing helps to overcome these challenges.… read more here.

Keywords: authentication protocol; user authentication; protocol; mobile user ... See more keywords
Photo by camstejim from unsplash

Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System

Sign Up to like & get
recommendations!
Published in 2018 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-018-3220-4

Abstract: In recent years, E-healthcare system is quite popular and the easiest medium to avail high-quality healthcare services from the specialized medical professions. In this system, the security is one of the major concern issues since… read more here.

Keywords: system; user authentication; healthcare system; security ... See more keywords
Photo by elyaspasban from unsplash

Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2891603

Abstract: Keystroke biometrics is a well-investigated dynamic behavioral methodology that utilizes the unique behavioral patterns of users to verify their identity when tapping keys. However, the performance of keystroke biometrics is unreliable due to its high… read more here.

Keywords: user authentication; keystroke biometrics; adversarial noise; rate ... See more keywords
Photo from wikipedia

A Frictionless and Secure User Authentication in Web-Based Premium Applications

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3110310

Abstract: By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily. Currently, there is an evolution of various complex user authentication schemes based on the… read more here.

Keywords: secure user; user authentication; authentication; authentication process ... See more keywords
Photo from wikipedia

User Authentication Protocol Based on the Location Factor for a Mobile Environment

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3148537

Abstract: The way the internet is used by billions of users around the world has been revolutionized by mobile devices. The capabilities of smartphones are constantly growing, and the number of services available for mobile devices… read more here.

Keywords: mobile environment; based location; user authentication; process ... See more keywords
Photo from wikipedia

Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3164245

Abstract: Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths… read more here.

Keywords: authentication; user authentication; border; border control ... See more keywords
Photo from wikipedia

A Review of EEG-Based User Authentication: Trends and Future Research Directions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253026

Abstract: Recently, the use of Electroencephalography (EEG) in scientific research on User Authentication (UA) has led to cutting-edge experiments that seek to identify and authenticate individuals based on their brain activity in particular usage scenarios. Utilizing… read more here.

Keywords: authentication; user authentication; future research; based user ... See more keywords
Photo by bugsster from unsplash

Benchmarking Neural Network Compression Techniques for Ocular-Based User Authentication on Smartphones

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3265357

Abstract: With the unprecedented mobile technology revolution, mobile devices have transcended from being the primary means of communication to an all-in-one platform. Consequently, an increasing number of individuals are accessing online services for e-commerce and banking… read more here.

Keywords: user authentication; ocular based; authentication smartphones; based user ... See more keywords
Photo from wikipedia

Continuous User Authentication by Contactless Wireless Sensing

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2916777

Abstract: This paper presents BodyPIN, which is a continuous user authentication system by contactless wireless sensing using commodity Wi-Fi. BodyPIN can track the current user’s legal identity throughout a computer system’s execution. In case the authentication… read more here.

Keywords: contactless wireless; user authentication; wireless sensing; authentication ... See more keywords