The fall of one, the rise of many: a survey on multi-biometric fusion methods

LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …

Continuous and transparent multimodal authentication: reviewing the state of the art

A Al Abdulwahid, N Clarke, I Stengel, S Furnell… - Cluster …, 2016 - Springer
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …

[PDF][PDF] Best practices for ensuring security in Devops: A case study approach

DS Battina - International Journal of Innovations in Engineering …, 2017 - researchgate.net
The main purpose of this paper is to explore the best practices that can be adopted to
ensure security in DevOps. Among the paper's key topics are the definitions of both DevOps …

A high-security-level iris cryptosystem based on fuzzy commitment and soft reliability extraction

KC Lin, YM Chen - IEEE Transactions on Dependable and …, 2023 - ieeexplore.ieee.org
In this paper, an error-correction-based iris recognition (EC-IR) scheme that guarantees both
secure template storage and high-level recognition accuracy is first constructed for personal …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security

MAM El-Bendary, H Kasban, A Haggag… - Multimedia Tools and …, 2020 - Springer
The authentication of the Wireless Body Area Networks (WBANs) nodes is a vital factor in its
medical applications. This paper, investigates methods of authentication over these …

You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks

L Zhou, C Su, W Chiu, KH Yeh - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is an evolutionary paradigm seamlessly integrating an
enormous number of smart objects within the Internet. Recently, with the rapid growth and …

FIDOnuous: a FIDO2/WebAuthn extension to support continuous web authentication

E Klieme, J Wilke, N van Dornick… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
For many years username and password are the common solution to protect sensitive web
services despite its various drawbacks. While many alternatives were proposed to improve …

Gesture and sociability-based continuous authentication on smart mobile devices

ZI Rauen, F Anjomshoa, B Kantarci - Proceedings of the 16th ACM …, 2018 - dl.acm.org
In this paper, we propose a new continuous verification platform on smart mobile devices. To
this end, we integrate gesture-based features with interaction with social networking apps to …

Securing cloud storage by transparent biometric cryptography

L Abed, N Clarke, B Ghita, A Alruban - Innovative Security Solutions for …, 2019 - Springer
With the capability of storing huge volumes of data over the Internet, cloud storage has
become a popular and desirable service for individuals and enterprises. The security issues …