The challenges of IoT addressing security, ethics, privacy, and laws

A Karale - Internet of Things, 2021 - Elsevier
Abstract Internet of Things or IoT is a rapidly growing network of interconnected 'things'
embedded with sensors to collect and exchange data over the internet without the need for …

[HTML][HTML] Privacy-preserving sensor-based continuous authentication and user profiling: a review

L Hernández-Álvarez, JM de Fuentes… - Sensors, 2020 - mdpi.com
Ensuring the confidentiality of private data stored in our technological devices is a
fundamental aspect for protecting our personal and professional information. Authentication …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

[PDF][PDF] The internet of things (IoT) and its application domains

Y Perwej, K Haq, F Parwej, M Mumdouh… - International Journal of …, 2019 - researchgate.net
There is no suspicion that IoT has added a new dimension to the living being by the link
between smart objects. Thus making the link among any media and anything at any place …

Toward unconstrained palmprint recognition on consumer devices: A literature review

AS Ungureanu, S Salahuddin, P Corcoran - IEEE Access, 2020 - ieeexplore.ieee.org
As a biometric modality, palmprints have been largely under-utilized, but they offer some
advantages over fingerprints and facial biometrics. Recent improvements in imaging …

Deep neural network and data augmentation methodology for off-axis iris segmentation in wearable headsets

V Varkarakis, S Bazrafkan, P Corcoran - Neural Networks, 2020 - Elsevier
A data augmentation methodology is presented and applied to generate a large dataset of
off-axis iris regions and train a low-complexity deep neural network. Although of low …

Everything you want to know about watermarking: From paper marks to hardware protection

SP Mohanty, A Sengupta, P Guturu… - IEEE consumer …, 2017 - ieeexplore.ieee.org
This article presents a detailed discussion of various aspects of watermarking technologies
on applications ranging from the embedding of marks in the pictorial information on paper to …

[HTML][HTML] Channel reduction for an EEG-based authentication system while performing motor movements

EC Ketola, M Barankovich, S Schuckers… - Sensors, 2022 - mdpi.com
Commercial use of biometric authentication is becoming increasingly popular, which has
sparked the development of EEG-based authentication. To stimulate the brain and capture …

[PDF][PDF] Surveying biometric authentication for mobile device security

TJ Neal, DL Woodard - Journal of Pattern Recognition Research, 2016 - cse.usf.edu
Mobile devices, such as smartphones and tablets, are frequently used for creation and
transmission of private and sensitive messages and files. While personal identification …

BioPrivacy: Development of a keystroke dynamics continuous authentication system

I Stylios, A Skalkos, S Kokolakis, M Karyda - European Symposium on …, 2021 - Springer
Session authentication schemes establish the identity of the user only at the beginning of the
session, so they are vulnerable to attacks that tamper with communications after the …