Continuous authentication using biometrics: An advanced review

G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …

A usable and robust continuous authentication framework using wearables

A Acar, H Aksu, AS Uluagac… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
One-time login process in conventional authentication systems does not guarantee that the
identified user is the actual user throughout the session. However, it is necessary to re-verify …

Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security

MAM El-Bendary, H Kasban, A Haggag… - Multimedia Tools and …, 2020 - Springer
The authentication of the Wireless Body Area Networks (WBANs) nodes is a vital factor in its
medical applications. This paper, investigates methods of authentication over these …

FUZZY LOGIC IN TERMS OF BIOMETRICS.

KK Singh, S Barde - I-Manager's Journal on Image …, 2020 - search.ebscohost.com
In a biometric system, there are physical or behavioral traits of humans used for the
identification and verification of humans. It has the ability to improve the security of any …

JBCA: Designing an Adaptative Continuous Authentication Architecture

JJ Martınez-Herráiz - … in Physical Agents II: Proceedings of the …, 2020 - books.google.com
Several continuous authentication methods provide very accurate ways of detecting the
impersonation of a user. However, even though they should be access control chain's links …

Privacy-aware Security Applications in the Era of Internet of Things

A Acar - 2020 - digitalcommons.fiu.edu
In this dissertation, we introduce several novel privacy-aware security applications. We split
these contributions into three main categories: First, to strengthen the current authentication …