Privacy and security in internet of things and wearable devices

O Arias, J Wurm, K Hoang, Y Jin - IEEE transactions on multi …, 2015 - ieeexplore.ieee.org
Enter the nascent era of Internet of Things (IoT) and wearable devices, where small
embedded devices loaded with sensors collect information from its surroundings, process it …

Security and privacy in IoT era

O Arias, K Ly, Y Jin - Smart Sensors at the IoT Frontier, 2017 - Springer
Trends in miniaturization have resulted in an explosion of small, low-power devices with
network connectivity. Welcome to the era of Internet of Things (IoT), wearable devices, and …

Bypass biometric lock systems with gelatin artificial fingerprint

E Maro, M Kovalchuk - Proceedings of the 11th International Conference …, 2018 - dl.acm.org
The article describes a direct attack to bypass devices lock system by using fingerprint
verification. We use method of creating a gelatin artificial fingerprints to bypass the locking …

[PDF][PDF] Bypass Mobile Lock Systems with Gelatin Artificial Fingerprint

EA Maro, MM Kovalchuk - Int. J. Comput. Sci. Eng, 2018 - researchgate.net
We briefly described how to bypass mobile devices lock system by using fingerprint
verification. As the applying method the method of counterfeiting the fingerprint of the mobile …

Towards Hardware Assisted Cyber Security

O Arias - 2022 - search.proquest.com
The growth in computational power has increased exponentially throughout the years as a
consequence of the so-called Moore's law. In some devices, this increase in computational …

[PDF][PDF] Alternative Framework for Enhancing Image Quality of the Fingerprint

MA Abdullahi, R Rimiru… - International Journal of …, 2017 - researchgate.net
Fingerprint Identification is one of the most popular biometric methods used to verify and
identify a person; formally it is defined as “The pattern of ridges and furrows on an individual …