MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEe …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as …
DT Manurung - Jour of Adv Research in Dynamical & Control …, 2020 - researchgate.net
The purpose of Multi-factor Authentication is to create multiple layers of defense and make it more difficult for unauthorized people to access targets such as physical locations, computer …
MR Zafar, MA Shah - 2016 22nd International Conference on …, 2016 - ieeexplore.ieee.org
The smartphone market is growing rapidly and enriching our digital lives by instant of information sharing. As smartphone devices contain sensitive data of users, it is very …
N Zivic, O Ur-Rehman - Journal of Intelligent & Fuzzy Systems, 2020 - content.iospress.com
An algorithm for improved error correction of the data protected using standard security mechanisms, like Message Authentication Codes, is introduced in this paper. Images are …
The advancement of technology is currently showing no signs of settling down in the 21st century. However, the modernization of security systems with the help of human body parts …
The recent implementation of biometrics solutions for user authentication in public networks has caused great concern about the safety and privacy of biometric data. Different …