16   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Yajie Wang, Xiaomei Zhang and Haomin Hu    
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been... ver más
Revista: Information    Formato: Electrónico

 
en línea
Lorenzo Bracciale, Pierpaolo Loreti, Claudio Pisa and Alex Shahidi    
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistical... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Sultan Almalki, Nasser Assery and Kaushik Roy    
While the password-based authentication used in social networks, e-mail, e-commerce, and online banking is vulnerable to hackings, biometric-based continuous authentication systems have been used successfully to handle the rise in unauthorized accesses. ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yosef Ashibani, Dylan Kauling and Qusay H. Mahmoud    
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door locks for remote access. Access to IoT devices, whether within the ... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Yosef Ashibani, Dylan Kauling and Qusay H. Mahmoud    
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Sonia Díaz-Santos, Óscar Cigala-Álvarez, Ester Gonzalez-Sosa, Pino Caballero-Gil and Cándido Caballero-Gil    
This paper introduces a cutting-edge approach that combines facial recognition and drowsiness detection technologies with Internet of Things capabilities, including 5G/6G connectivity, aimed at bolstering vehicle security and driver safety. The delineate... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yi Zhao and Song-Kyoo Kim    
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho    
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xiaoyan Yu, Chengyou Wang and Xiao Zhou    
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people?s attention. The fragile watermark for integrity authentica... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu    
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga    
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb... ver más
Revista: AI    Formato: Electrónico

 
en línea
Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved    
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Farhad Ahamed, Farnaz Farid, Basem Suleiman, Zohaib Jan, Luay A. Wahsheh and Seyed Shahrestani    
With the advent of modern technologies, the healthcare industry is moving towards a more personalised smart care model. The enablers of such care models are the Internet of Things (IoT) and Artificial Intelligence (AI). These technologies collect and ana... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dania Marabissi, Lorenzo Mucchi and Andrea Stomaci    
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigm... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Krzysztof Golofit and Piotr Z. Wieczorek    
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs). We propose an idea that the PUF cryptographic keys can ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Raghav V. Sampangi,Srinivas Sampalli     Pág. 44 - 56
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat ? RFID tags have severe resourc... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »