An essential part of cloud computing, IoT, and in general the broad field of digital systems, is constituted by the mechanisms which provide access to a number of services or …
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed. As a result …
The existing palmprint protection schemes without verification degrading do not strictly meet non-invertible requirement; while non-invertible palmprint protection schemes do not meet …
H Kaur, P Khanna - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The cancelable biometric-based template protection method proposed in this paper addresses security and privacy concerns emerging from the phenomenal usage of biometric …
C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image …
H Kaur, P Khanna - Future Generation Computer Systems, 2020 - Elsevier
Biometric authentication over cloud and network applications demands a wide range of solutions against increasing cyber crimes and digital identity thefts. This work addresses …
Multi-biometric systems are known to be universal and more accurate in biometric recognition. However, the storage of multiple biometric templates as separate entities pose …