Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

[HTML][HTML] Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Design of secure mutual authentication scheme for metaverse environments using blockchain

J Ryu, S Son, J Lee, Y Park, Y Park - Ieee Access, 2022 - ieeexplore.ieee.org
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …

[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

[HTML][HTML] Security and accuracy of fingerprint-based biometrics: A review

W Yang, S Wang, J Hu, G Zheng, C Valli - Symmetry, 2019 - mdpi.com
Biometric systems are increasingly replacing traditional password-and token-based
authentication systems. Security and recognition accuracy are the two most important …

Cancelable biometrics: A review

VM Patel, NK Ratha… - IEEE signal processing …, 2015 - ieeexplore.ieee.org
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …

Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint

M Hammad, Y Liu, K Wang - Ieee Access, 2018 - ieeexplore.ieee.org
A multimodal biometric system integrates information from more than one biometric modality
to improve the performance of each individual biometric system and make the system robust …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Secure ECC-based three-factor mutual authentication protocol for telecare medical information system

J Ryu, J Oh, D Kwon, S Son, J Lee, Y Park… - IEEE Access, 2022 - ieeexplore.ieee.org
In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting
attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …