Sign Up to like & get
recommendations!
0
Published in 2017 at "Artificial Life and Robotics"
DOI: 10.1007/s10015-017-0404-z
Abstract: At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication…
read more here.
Keywords:
authentication method;
surface electromyogram;
support vector;
user authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-017-0622-1
Abstract: Identity-based user authentication protocols have been presented to be applicable to resource-constrained devices such as mobile phones. Unfortunately, the previous protocols have the drawback of the key escrow problem. A new protocol of a user…
read more here.
Keywords:
protocol;
user authentication;
key exchange;
client server ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-019-01467-z
Abstract: The rapid growth of smart-phone users, mobile services and mobile applications, poses the challenges of storage space, processing capability, and battery lifetime at the users smart phones. Mobile cloud computing helps to overcome these challenges.…
read more here.
Keywords:
authentication protocol;
user authentication;
protocol;
mobile user ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-018-3220-4
Abstract: In recent years, E-healthcare system is quite popular and the easiest medium to avail high-quality healthcare services from the specialized medical professions. In this system, the security is one of the major concern issues since…
read more here.
Keywords:
system;
user authentication;
healthcare system;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2891603
Abstract: Keystroke biometrics is a well-investigated dynamic behavioral methodology that utilizes the unique behavioral patterns of users to verify their identity when tapping keys. However, the performance of keystroke biometrics is unreliable due to its high…
read more here.
Keywords:
user authentication;
keystroke biometrics;
adversarial noise;
rate ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3110310
Abstract: By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily. Currently, there is an evolution of various complex user authentication schemes based on the…
read more here.
Keywords:
secure user;
user authentication;
authentication;
authentication process ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3148537
Abstract: The way the internet is used by billions of users around the world has been revolutionized by mobile devices. The capabilities of smartphones are constantly growing, and the number of services available for mobile devices…
read more here.
Keywords:
mobile environment;
based location;
user authentication;
process ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3164245
Abstract: Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths…
read more here.
Keywords:
authentication;
user authentication;
border;
border control ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3253026
Abstract: Recently, the use of Electroencephalography (EEG) in scientific research on User Authentication (UA) has led to cutting-edge experiments that seek to identify and authenticate individuals based on their brain activity in particular usage scenarios. Utilizing…
read more here.
Keywords:
authentication;
user authentication;
future research;
based user ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3265357
Abstract: With the unprecedented mobile technology revolution, mobile devices have transcended from being the primary means of communication to an all-in-one platform. Consequently, an increasing number of individuals are accessing online services for e-commerce and banking…
read more here.
Keywords:
user authentication;
ocular based;
authentication smartphones;
based user ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2916777
Abstract: This paper presents BodyPIN, which is a continuous user authentication system by contactless wireless sensing using commodity Wi-Fi. BodyPIN can track the current user’s legal identity throughout a computer system’s execution. In case the authentication…
read more here.
Keywords:
contactless wireless;
user authentication;
wireless sensing;
authentication ... See more keywords