Edu-Metaverse: Concept, architecture, and applications

T Wu, F Hao - Interactive Learning Environments, 2023 - Taylor & Francis
As an important form of education in the future, Edu-Metaverse cannot only innovate the
existing teaching mode, provide diversified teaching resources and environments, realize …

Biometric-based authentication in Internet of Things (IoT): A review

V Singh, C Kant - … Technology and Computing: Proceedings of AICTC …, 2022 - Springer
Due to emerging services of IoT in smart city, industry, smart home, personal assistant, etc.,
safe guards required at its different phases. The communication involves in IoT environment …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - arXiv preprint arXiv:2311.13416, 2023 - arxiv.org
This paper conducts an extensive review of biometric user authentication literature,
addressing three primary research questions:(1) commonly used biometric traits and their …

A secure online fingerprint authentication system for industrial IoT devices over 5G networks

A Bedari, S Wang, W Yang - Sensors, 2022 - mdpi.com
The development of 5G networks has rapidly increased the use of Industrial Internet of
Things (IIoT) devices for control, monitoring, and processing purposes. Biometric-based user …

An efficient privacy-preserving blockchain storage method for internet of things environment

D Jia, G Yang, M Huang, J Xin, G Wang, GY Yuan - World Wide Web, 2023 - Springer
Blockchain is a key technology to realize decentralized trust management. In recent studies,
sharding-based blockchain models are proposed and applied to the resource-constrained …

Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey

Y Shen, C Shepherd, CM Ahmed, S Shen, X Wu… - … Applications of Artificial …, 2024 - Elsevier
Privacy preservation of the big data generated, deposited, and communicated by smart IoT
(Internet of Things) nodes is the major challenge in IoT networks. Anonymization, encryption …

A Triboelectric Sensor with Double Bubble Structure Applied in a High Security Double Lock System

W Ouyang, F Luo, Y Yao, B Qu, C Feng, Y Xie… - ACS …, 2023 - ACS Publications
With more attention on personal privacy and the need for a security defense, it is necessary
to design an intelligent lock system with a higher security performance. Here, a novel high …

A novel technique for fingerprint template security in biometric authentication systems

A Ali, VS Baghel, S Prakash - The Visual Computer, 2023 - Springer
The deployment of biometrics spans over almost every application that incorporates user
authentication. Fingerprint biometrics in particular is by far the most popular choice in …

[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …