GK Sidiropoulos, P Kiratsa, P Chatzipetrou… - Journal of …, 2021 - mdpi.com
This paper aims to provide a brief review of the feature extraction methods applied for finger vein recognition. The presented study is designed in a systematic way in order to bring light …
Z Zhang, H Ning, F Farha, J Ding, KKR Choo - Digital Communications and …, 2022 - Elsevier
Effective user authentication is key to ensuring equipment security, data privacy, and personalized services in Internet of Things (IoT) systems. However, conventional mode …
Deoxyribonucleic acid (DNA) can be considered as one of the most useful biometrics. It has effectively been used for recognizing persons. However, it seems that there is still a need to …
J Liu, K Cui, X Zou, J Han, F Lin… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
Multi-factor user authentication becomes increasingly popular due to its superior security comparing with single-factor user authentication. However, existing multi-factor user …
J Liu, X Zou, J Han, F Lin, K Ren - 2020 IEEE/ACM 28th …, 2020 - ieeexplore.ieee.org
Multi-factor user authentication (MFUA) becomes increasingly popular due to its superior security comparing with single-factor user authentication. However, existing MFUAs require …
Privacy-preserving biometrics identification has drawn greater attention that efficiently provides secure storage of sensitive information in cloud servers. In this paper, we design a …
R Wazirali, R Ahmed - Computer Systems Science & Engineering, 2022 - researchgate.net
The global pandemic of novel coronavirus that started in 2019 has seriously affected daily lives and placed everyone in a panic condition. Widespread coronavirus led to the adoption …
K Kovalan, SZ Omar, L Tang… - International …, 2021 - pdfs.semanticscholar.org
The authentication system is one of the most important methods for maintaining information security in smart devices. There are many authentication methods, such as password …
S Pahuja, N Goel - AI Communications, 2024 - content.iospress.com
Critical applications ranging from sensitive military data to restricted area access demand selective user authentication. The prevalent methods of tokens, passwords, and other …