Search
Search Results
-
Priority-based Multi-feature Vector Model Using Convolution Neural Network for Biometric Authentication
Many societal institutions have increased standards for the efficacy and dependability of identification systems in response to the ever-increasing...
-
An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments
Today, cloud computing has received greater attention for storing and processing huge amounts of data over the internet. Security concerns are one of...
-
Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...
-
EEG-Driven Biometric Authentication for Investigation of Fourier Synchrosqueezed Transform-ICA Robust Framework
Biometric authentication systems have recently been gaining increased attention as an integral part of modern civic life. Security surveillance...
-
Biometric-based Remote Mutual Authentication Scheme for Mobile Device
Remote user authentication schemes provide a system to verify the legitimacy of remote users’ authentication request over insecure communication...
-
Touch-Free Biometric Authentication System
Touch-free biometric authentication systems have gained increasing attention in recent years due to their potential to provide secure and convenient... -
Methods of Biometric Authentication for Person Identification
Biometric authentication methods have revolutionized the way individuals are identified and granted access to secured systems and services. Unlike... -
Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment
Since ancient times, privacy is being a greater issue. However, its impact on a subject where its significance is readily apparent has been...
-
A Blockchain-Based Biometric Protection and Authentication Mechanism
The probability of biometric information leakage, the dependability on authentication modules, and the lack of transparency in the management of... -
A secured optimised AOMDV routing protocol in MANET using lightweight continuous multimodal biometric authentication
Mobile ad hoc networks (MANETs) is a very popular research area due to their wide application and ease of deployment. Due to the inherent nature of...
-
An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment
In order to solve the problems of few and complex traditional cross domain authentication schemes, a double-offloading biometric authentication for...
-
Reliable Biometric Authentication with Privacy Protection
Objectives To study and compare different types of biometric systems and to obtain the result for the same, this paper has discussed the need of... -
Patient Identifier Using Biometric Authentication
In case of emergency situations like accidents, the doctor may not have the complete medical history of the patient they are dealing with. This may... -
Biometric-Based Authentication in Online Banking
The use of technology has become the integral part of human life. Most importantly the introduction of Internet has made the lives of people easy and... -
Development, evaluation, and analysis of biometric-based bank vault user authentication system through brainwaves
The bank vault’s security system require a reliable and highly secure authentication system. Providing a biometric-based authentication for safety...
-
Evaluation of Multiplatfom Component for Biometric Authentication in Low-Code Programming Platform – Case Study
Biometric authentication has emerged as a prominent method for secure user identity verification. Integrating biometric authentication into software... -
A Framework for Biometric Authentication based on Decision Level Fusion
Unimodal systems are still facing challenges in authentication though there are considerable advances in recent years. Some of the challenges can be... -
A Review Paper on Biometric Authentication and Geospatial Data – Case of Zambia
In the current global landscape, security concerns have reached unprecedented heights, necessitating innovative approaches to combat threats ranging... -
Secure multiparty access and authentication based on advanced fuzzy extractor in smart home
Smart home (SH) technology is a new IoT application that allows users to remotely control household appliances. It provides several facilities like...
-
Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication
In the existing multimodal biometric authentication technique, there is no integrity in the biometric information, and authentication of end users is...