On secret sharing with newton's polynomial for multi-factor authentication

S Bezzateev, V Davydov, A Ometov - Cryptography, 2020 - mdpi.com
Security and access control aspects are becoming more and more essential to consider
during the design of various systems and the tremendous growth of digitization. One of the …

A Model for Biometric Selection in Public Services Sector

ME Maeko, D van der Haar - Southern African Conference for Artificial …, 2022 - Springer
The need to authenticate people using their biometric attributes and tighten information
security in organisations significantly increased over the years and public services are no …

Ethical implications of using artificial intelligence for multimodal biometric selection model evaluation

E Maeko, D Van Der Haar - 2023 6th International Conference …, 2023 - ieeexplore.ieee.org
In today's digital world, information security, and person In today's digital world, information
security, and personal authentication are major concerns. As technology has advanced, so …

[图书][B] Data and Applications Security and Privacy XXXVIII: 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings

AL Ferrara - books.google.com
In response to the call for papers for this edition, we received 39 submissions. Each
submission underwent a thorough single-blind peer review process, evaluating its …

Touchless Palmprint and Fingerprint Recognition

R Donida Labati, A Genovese, V Piuri… - Advances in Computing …, 2022 - Springer
Biometric systems based on hand traits captured using touchless acquisition procedures are
increasingly being used for the automatic recognition of individuals due to their favorable …

Poisoning Attacks on Learning-Based Keystroke Authentication and a Residue Feature Based Defense

Z Wang - 2020 - digitalcommons.latech.edu
Behavioral biometrics, such as keystroke dynamics, are characterized by relatively large
variation in the input samples as compared to physiological biometrics such as fingerprints …