Deepknuckle: Deep learning for finger knuckle print recognition

AS Tarawneh, AB Hassanat, E Alkafaween, B Sarayrah… - Electronics, 2022 - mdpi.com
Biometric technology has received a lot of attention in recent years. One of the most
prevalent biometric traits is the finger-knuckle print (FKP). Because the dorsal region of the …

Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices

D Vinko, K Miličević, I Lukić, M Köhler - Sensors, 2023 - mdpi.com
Blockchain-based applications necessitate the authentication of connected devices if they
are employed as blockchain oracles. Alongside identity authentication, it is crucial to ensure …

Aac-iot: Attribute access control scheme for iot using lightweight cryptography and hyperledger fabric blockchain

S Alshehri, O Bamasag - Applied Sciences, 2022 - mdpi.com
The Internet of Things (IoT) is an integrated environment as it merges physical smart objects
to the Internet via wireless technologies to share data. The global connectivity of IoT devices …

Continuous authentication methods for zero-trust cybersecurity architecture

I Matiushin, V Korkhov - … Conference on Computational Science and Its …, 2023 - Springer
Zero-trust architecture (ZTA) is a new approach to distributed systems cybersecurity which
both provides better data protection and reflects the structure of modern information systems …

Crossover Covering Algorithm in Intelligent Space Design

J Chi, H Sun - Proceedings of the First International Conference on …, 2024 - eudl.eu
With the progress of the times and the development of science and technology, more and
more attention has been paid to intelligent space design. Taking office space as the main …