We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,150 results
  1. Priority-based Multi-feature Vector Model Using Convolution Neural Network for Biometric Authentication

    Many societal institutions have increased standards for the efficacy and dependability of identification systems in response to the ever-increasing...

    Suneetha Madduluri, T. Kishore Kumar in International Journal of Computational Intelligence Systems
    Article Open access 03 June 2024
  2. An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments

    Today, cloud computing has received greater attention for storing and processing huge amounts of data over the internet. Security concerns are one of...

    R. Megiba Jasmine, J. Jasper, M. R. Geetha in Wireless Networks
    Article 10 June 2024
  3. Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications

    In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...

    T. Arpitha, Dharamendra Chouhan, J. Shreyas in Journal of Engineering and Applied Science
    Article Open access 03 January 2024
  4. EEG-Driven Biometric Authentication for Investigation of Fourier Synchrosqueezed Transform-ICA Robust Framework

    Biometric authentication systems have recently been gaining increased attention as an integral part of modern civic life. Security surveillance...

    Kutlucan Gorur, Emre Olmez, ... Onursal Cetin in Arabian Journal for Science and Engineering
    Article 04 April 2023
  5. Biometric-based Remote Mutual Authentication Scheme for Mobile Device

    Remote user authentication schemes provide a system to verify the legitimacy of remote users’ authentication request over insecure communication...

    Sheng-Kai Chen, Jenq-Shiou Leu, ... Tian Song in Wireless Personal Communications
    Article 29 June 2022
  6. Touch-Free Biometric Authentication System

    Touch-free biometric authentication systems have gained increasing attention in recent years due to their potential to provide secure and convenient...
    Dhanraj Jadhav, Tushar Mahajan, ... Aditya Gujrathi in ICT Analysis and Applications
    Conference paper 2023
  7. Methods of Biometric Authentication for Person Identification

    Biometric authentication methods have revolutionized the way individuals are identified and granted access to secured systems and services. Unlike...
    Daria Polunina, Oksana Zolotukhina, ... Iryna Yarosh in 2nd International Congress of Electrical and Computer Engineering
    Conference paper 2024
  8. Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment

    Since ancient times, privacy is being a greater issue. However, its impact on a subject where its significance is readily apparent has been...

    G. Reshma, B. T. Prasanna, ... M. Sangeetha in Soft Computing
    Article 28 April 2023
  9. A Blockchain-Based Biometric Protection and Authentication Mechanism

    The probability of biometric information leakage, the dependability on authentication modules, and the lack of transparency in the management of...
    Conference paper 2023
  10. A secured optimised AOMDV routing protocol in MANET using lightweight continuous multimodal biometric authentication

    Mobile ad hoc networks (MANETs) is a very popular research area due to their wide application and ease of deployment. Due to the inherent nature of...

    Article 17 April 2022
  11. An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment

    In order to solve the problems of few and complex traditional cross domain authentication schemes, a double-offloading biometric authentication for...

    Yuguang Xu, Yanlin Meng, Hongfeng Zhu in Wireless Personal Communications
    Article 01 March 2022
  12. Reliable Biometric Authentication with Privacy Protection

    Objectives To study and compare different types of biometric systems and to obtain the result for the same, this paper has discussed the need of...
    Shilpi Barman Sharma, Ishika Dhall, ... Pushpita Chatterjee in Advances in Communication, Devices and Networking
    Conference paper 2023
  13. Patient Identifier Using Biometric Authentication

    In case of emergency situations like accidents, the doctor may not have the complete medical history of the patient they are dealing with. This may...
    N. Ramya, N. Mahika Kamale, ... T. Anuradha in Computer Communication, Networking and IoT
    Conference paper 2023
  14. Biometric-Based Authentication in Online Banking

    The use of technology has become the integral part of human life. Most importantly the introduction of Internet has made the lives of people easy and...
    Shivaraj Hublikar, Vishal B. Pattanashetty, ... N. S. V. Shet in Information and Communication Technology for Competitive Strategies (ICTCS 2021)
    Conference paper 2023
  15. Development, evaluation, and analysis of biometric-based bank vault user authentication system through brainwaves

    The bank vault’s security system require a reliable and highly secure authentication system. Providing a biometric-based authentication for safety...

    Article 29 January 2022
  16. Evaluation of Multiplatfom Component for Biometric Authentication in Low-Code Programming Platform – Case Study

    Biometric authentication has emerged as a prominent method for secure user identity verification. Integrating biometric authentication into software...
    Conference paper 2024
  17. A Framework for Biometric Authentication based on Decision Level Fusion

    Unimodal systems are still facing challenges in authentication though there are considerable advances in recent years. Some of the challenges can be...
    Conference paper 2024
  18. A Review Paper on Biometric Authentication and Geospatial Data – Case of Zambia

    In the current global landscape, security concerns have reached unprecedented heights, necessitating innovative approaches to combat threats ranging...
    Conference paper 2024
  19. Secure multiparty access and authentication based on advanced fuzzy extractor in smart home

    Smart home (SH) technology is a new IoT application that allows users to remotely control household appliances. It provides several facilities like...

    Sirisha Uppuluri, G. Lakshmeeswari in Soft Computing
    Article 20 September 2023
  20. Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication

    In the existing multimodal biometric authentication technique, there is no integrity in the biometric information, and authentication of end users is...

    M. Gayathri, C. Malathy in Wireless Personal Communications
    Article 30 June 2021
Did you find what you were looking for? Share feedback.