O Arias, K Ly, Y Jin - Smart Sensors at the IoT Frontier, 2017 - Springer
Trends in miniaturization have resulted in an explosion of small, low-power devices with network connectivity. Welcome to the era of Internet of Things (IoT), wearable devices, and …
E Maro, M Kovalchuk - Proceedings of the 11th International Conference …, 2018 - dl.acm.org
The article describes a direct attack to bypass devices lock system by using fingerprint verification. We use method of creating a gelatin artificial fingerprints to bypass the locking …
EA Maro, MM Kovalchuk - Int. J. Comput. Sci. Eng, 2018 - researchgate.net
We briefly described how to bypass mobile devices lock system by using fingerprint verification. As the applying method the method of counterfeiting the fingerprint of the mobile …
The growth in computational power has increased exponentially throughout the years as a consequence of the so-called Moore's law. In some devices, this increase in computational …
MA Abdullahi, R Rimiru… - International Journal of …, 2017 - researchgate.net
Fingerprint Identification is one of the most popular biometric methods used to verify and identify a person; formally it is defined as “The pattern of ridges and furrows on an individual …