[PDF][PDF] A secure mobile payment framework based on face authentication

Z Xu, T Zhang, Y Zeng, J Wan, W Wu - Proc. Int. MultiConf. Eng. Comput …, 2015 - iaeng.org
With the increasing market share of the smartphone, more and more people use m-payment
(mobile payment) to pay for something in their daily life. In this paper, a brand new m …

A face recognition method in machine learning (ml) for enhancing security in smart home

M Alshar'e, MR Al Nasar, R Kumar… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The study explores with Machine learning (ML), which is a type of neural network (AI) that
empowers software programmers to start increasing prediction without being done with full …

[PDF][PDF] Face recognition door lock system

AR Prasath, A Kumar, A Yadav, B Acharya… - Research in Applied …, 2020 - academia.edu
Nowadays, we are facing security issues in every aspect. So we have to resolve these
issues by using updated technology. In this project, we are using the Face recognition …

Secure physical access with NFC-enabled smartphones

C Arnosti, D Gruntz, M Hauri - … of the 13th International Conference on …, 2015 - dl.acm.org
This paper presents a smartphone-based physical access control system in which the
access points are not directly connected to a central authorization server, but rather use the …

ABLE: Zero-effort two-factor authentication exploiting BLE co-location

Y He, W Wang, Y Teng, Q Wang… - 2022 IEEE Wireless …, 2022 - ieeexplore.ieee.org
Two-factor authentication (2FA) offers very important security enhancement to traditional
username-password authentication, while in many cases incurring undesirable user …

Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB

Y Fujita, A Inomata… - 2019 20th Asia-Pacific …, 2019 - ieeexplore.ieee.org
As the number of Internet users increases, their usage also diversifies, and it is important to
prevent Identity on the Internet (Digital Identity) from being violated. Unauthorized …

A secure and improved two factor authentication scheme using elliptic curve and bilinear pairing for cyber physical systems

A Sengupta, A Singh, P Kumar, T Dhar - Multimedia Tools and …, 2022 - Springer
In order to equip the technical fraternity with smart technologies, the past few years have
witnessed increasing usage of Cyber-Physical Systems (CPS) in different critical …

Implementation of two factor authentication based on rfid and face recognition using lbp algorithm on access control system

B Wahyudono, D Ogi - … Conference on ICT for Smart Society …, 2020 - ieeexplore.ieee.org
Studies on two-factor authentication based on RFID and face recognition have been carried
out on a large scale. However, these studies didn't discuss the way to overcome the …

[PDF][PDF] IoT based door lock and unlock system using face recognition

R Bhise, N Phadnis, R Bari, V Dhage - … Research Journal of …, 2018 - academia.edu
A day to day home security level grown up to provide security to our house IOT based face
recognition can be implemented. A standard web camera to capture the image to identify the …

Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator's fingerprint and smart mobile device

AJ Mohammed, AA Yassin - Cryptography, 2019 - mdpi.com
In an era of tremendous development in information technology and the Internet of Things
(IoT), security plays a key role in safety devices connected with the Internet. Authentication is …