Multimodal biometric authentication: A review

S Pahuja, N Goel - AI Communications, 2024 - content.iospress.com
Critical applications ranging from sensitive military data to restricted area access demand
selective user authentication. The prevalent methods of tokens, passwords, and other …

Decentralized, Privacy‐Preserving, Single Sign‐On

O Mir, M Roland, R Mayrhofer - Security and Communication …, 2022 - Wiley Online Library
In current single sign‐on authentication schemes on the web, users are required to interact
with identity providers securely to set up authentication data during a registration phase and …

SWAT: seamless web authentication technology

F Rochet, K Efthymiadis, FÃ Koeune… - The World Wide Web …, 2019 - dl.acm.org
We present a seamless challenge-response authentication protocol which leverages on the
variations of html5 canvas rendering made by the software and hardware stacks. After a …

IoT-based activities of daily living for abnormal behavior detection: Privacy issues and potential countermeasures

MA Mustafa, A Konios… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Activities of daily living (ADL) systems have been playing an important role in assessing and
monitoring the quality of life of elderly people for many years. With the recent advancement …

Collaborative authentication using threshold cryptography

A Abidin, A Aly, MA Mustafa - Emerging Technologies for Authorization …, 2020 - Springer
We propose a collaborative authentication protocol where multiple user devices (eg, a
smartphone, a smartwatch and a wristband) collaborate to authenticate the user to a third …

Frictionless authentication systems: emerging trends, Research challenges and opportunities

V Rimmer, D Preuveneers, W Joosen… - arXiv preprint arXiv …, 2018 - arxiv.org
Authentication and authorization are critical security layers to protect a wide range of online
systems, services and content. However, the increased prevalence of wearable and mobile …

[PDF][PDF] Privacy Preserving Credentials via Novel Primitives

O Mir - 2023 - epub.jku.at
Users or devices regularly need to demonstrate who they are on the Internet to enable
decisions like whether they can access a certain resource such as a service. This often …

[PDF][PDF] Mobile Collaborative Authentication

Y Vermeire - 2021 - esat.kuleuven.be
Mobile Collaborative Authentication Page 1 Mobile Collaborative Authentication Yoshi Vermeire
Thesis submitted for the degree of Master of Science in Electrical Engineering, option ICT …

Privacy Preserving Credentials via Novel Primitives/Author Omid Mir

O Mir - 2023 - epub.jku.at
Users or devices regularly need to demonstrate who they are on the Internet to enable
decisions like whether they can access a certain resource such as a service. This often …

[PDF][PDF] Frictionless authentication systems: Emerging trends, research challenges and opportunities

D Preuveneers, W Joosen, MA Mustafa… - the 11th Int. Conf. on … - personales.upv.es
Authentication and authorization are critical security layers to protect a wide range of online
systems, services and content. However, the increased prevalence of wearable and mobile …