[图书][B] Biometric security

J Hu, DCL Ngo, ABJ Teoh - 2015 - books.google.com
Modern biometrics delivers an enhanced level of security by means of a “proof of property”.
The design and deployment of a biometric system, however, hide many pitfalls, which, when …

The Future Security Solution to the Internet of Things: Biometric Technology

P Agarwal, A Mishra, BK Mishra - Internet of Things, 2023 - taylorfrancis.com
The interconnection of devices of our everyday use like vehicles, coolers, cell phones,
brilliant entryways, gadgets for checking, or monitoring devices is basically Internet of …

[图书][B] Biometrics and Cryptography

S Radhakrishnan, CM Travieso-Gonzalez - 2024 - books.google.com
Cryptography has crept into everything, from Web browsers and e-mail programs to cell
phones, bank cards, and cars. Shortly, we will see many new exciting applications for …

Physically unclonable functions (PUFs): A systematic literature review

M Al-Haidary, Q Nasir - 2019 Advances in Science and …, 2019 - ieeexplore.ieee.org
The purpose of this paper is to give an absolute newcomer a kick start to the literature of
Physically Unclonable Functions (PUFs) using as simple explanations as possible. In …

Physical unclonable function and hashing are all you need to mutually authenticate iot devices

A Mostafa, SJ Lee, YK Peker - Sensors, 2020 - mdpi.com
Internet of Things (IoT) has become the driving force in modern day technology with an
increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used …

Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices

M Ahmed, SJ Lee, YK Peker - Sensors, 2020 - search.proquest.com
Abstract Internet of Things (IoT) has become the driving force in modern day technology with
an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is …

[PDF][PDF] On the security risk of cancelable biometrics

X Dong, Z Jin, ABJ Teoh, M Tistarelli… - arXiv preprint arXiv …, 2019 - researchgate.net
Over the years, a number of biometric template protection schemes, primarily based on the
notion of “cancelable biometrics”(CB) have been proposed. An ideal cancelable biometric …

Continuous authentication of wearable device users from heart rate, gait, and breathing data

W Cheung, S Vhaduri - 2020 8th IEEE RAS/EMBS International …, 2020 - ieeexplore.ieee.org
The security of private information is becoming the bedrock of an increasingly digitized
society. While the users are flooded with passwords and PINs, these goldstandard explicit …

[PDF][PDF] Physical unclonable functions for IoT security

AM Naveed, KC Chua, B Sikdar - … on IoT Privacy, Trust, and Security, 2016 - ece.nus.edu.sg
Traditionally security for the Internet has been provided by classical cryptography. These
security primitives and techniques were designed with an implied assumption of physically …

On the physical security of physically unclonable functions

S Tajik - 2017 - Springer
Modern electronic embedded devices have become indispensable parts of our daily lives.
End user devices, such as smartphones, smartwatches, and smart home appliances, gather …