Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

A comprehensive overview of biometric fusion

M Singh, R Singh, A Ross - Information Fusion, 2019 - Elsevier
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

A secure biometrics-based multi-server authentication protocol using smart cards

V Odelu, AK Das, A Goswami - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication
scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

Measuring user confidence in smartphone security and privacy

E Chin, AP Felt, V Sekar, D Wagner - … of the eighth symposium on usable …, 2012 - dl.acm.org
In order to direct and build an effective, secure mobile ecosystem, we must first understand
user attitudes toward security and privacy for smartphones and how they may differ from …

Cardiac scan: A non-contact and continuous heart-based user authentication system

F Lin, C Song, Y Zhuang, W Xu, C Li… - Proceedings of the 23rd …, 2017 - dl.acm.org
Continuous authentication is of great importance to maintain the security level of a system
throughout the login session. The goal of this work is to investigate a trustworthy, continuous …

Facial soft biometrics for recognition in the wild: Recent works, annotation, and COTS evaluation

E Gonzalez-Sosa, J Fierrez… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The role of soft biometrics to enhance person recognition systems in unconstrained
scenarios has not been extensively studied. Here, we explore the utility of the following …

SCANet: sensor-based continuous authentication with two-stream convolutional neural networks

Y Li, H Hu, Z Zhu, G Zhou - ACM Transactions on Sensor Networks …, 2020 - dl.acm.org
Continuous authentication monitors the security of a system throughout the login session on
mobile devices. In this article, we present SCANet, a two-stream convolutional neural …

Soft biometrics: A survey: Benchmark analysis, open challenges and recommendations

B Hassan, E Izquierdo, T Piatrik - Multimedia Tools and Applications, 2021 - Springer
The field of biometrics research encompasses the need to associate an identity to an
individual based on the persons physiological or behaviour traits. While the use of intrusive …