A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

A context-aware authentication framework for smart homes

Y Ashibani, D Kauling… - 2017 IEEE 30th Canadian …, 2017 - ieeexplore.ieee.org
There has been a recent rapid increase in the number of Internet of Things (IoT) devices,
providing a wide range of services for smart homes such as surveillance cameras, smart …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

Design and implementation of a contextual-based continuous authentication framework for smart homes

Y Ashibani, D Kauling, QH Mahmoud - Applied System Innovation, 2019 - mdpi.com
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last
few years, providing a wide range of services such as camera feeds, light controls, and door …

A decade of security research in ubiquitous computing: results of a systematic literature review

E Kusen, M Strembeck - International Journal of Pervasive Computing …, 2016 - emerald.com
Purpose Ever since Mark Weiser coined the term “ubiquitous computing”(ubicomp) in 1988,
there has been a general interest in proposing various solutions that would support his …

[PDF][PDF] An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols.

P Cui - Int. J. Netw. Secur., 2016 - academia.edu
Abstract Radio Frequency Identification (RFID) technology is an automated identification
technology which is widely used to identify and track all kind of objects. However, it is a …

LocKey: location-based key extraction from the WiFi environment in the user's vicinity

P Jakubeit, A Peter, M van Steen - International Conference on …, 2023 - Springer
We investigate extracting persistent information from semi-volatile signals in the user's
vicinity to extend existing authentication factors. We use WiFi as a representative of semi …

Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes

US Premarathne - Energy, 2015 - Elsevier
In smart homes, users remotely manage resource utilization tasks and context-aware
services using portable devices and mobile communication technologies. Reliability of …

Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications

US Premarathne, I Khalil, M Atiquzzaman - Computer Networks, 2015 - Elsevier
In pervasive computing applications (eg electronic health records), the amount of
information permissible to be shared or accessed by mobile users results in high disclosure …

Location-enhanced authenticated key exchange

M Portnoi, CC Shen - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
We introduce LOCATHE (Location-Enhanced Authenticated Key Exchange), a generic
protocol that pools location, user attributes, access policy and desired services into a multi …