|
|
|
Yajie Wang, Xiaomei Zhang and Haomin Hu
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been...
ver más
|
|
|
|
|
|
|
Lorenzo Bracciale, Pierpaolo Loreti, Claudio Pisa and Alex Shahidi
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistical...
ver más
|
|
|
|
|
|
|
Sultan Almalki, Nasser Assery and Kaushik Roy
While the password-based authentication used in social networks, e-mail, e-commerce, and online banking is vulnerable to hackings, biometric-based continuous authentication systems have been used successfully to handle the rise in unauthorized accesses. ...
ver más
|
|
|
|
|
|
|
Yosef Ashibani, Dylan Kauling and Qusay H. Mahmoud
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door locks for remote access. Access to IoT devices, whether within the ...
ver más
|
|
|
|
|
|
|
Yosef Ashibani, Dylan Kauling and Qusay H. Mahmoud
|
|
|
|
|
|
|
Sonia Díaz-Santos, Óscar Cigala-Álvarez, Ester Gonzalez-Sosa, Pino Caballero-Gil and Cándido Caballero-Gil
This paper introduces a cutting-edge approach that combines facial recognition and drowsiness detection technologies with Internet of Things capabilities, including 5G/6G connectivity, aimed at bolstering vehicle security and driver safety. The delineate...
ver más
|
|
|
|
|
|
|
Yi Zhao and Song-Kyoo Kim
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ...
ver más
|
|
|
|
|
|
|
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i...
ver más
|
|
|
|
|
|
|
Xiaoyan Yu, Chengyou Wang and Xiao Zhou
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people?s attention. The fragile watermark for integrity authentica...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb...
ver más
|
|
|
|
|
|
|
Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend o...
ver más
|
|
|
|
|
|
|
Farhad Ahamed, Farnaz Farid, Basem Suleiman, Zohaib Jan, Luay A. Wahsheh and Seyed Shahrestani
With the advent of modern technologies, the healthcare industry is moving towards a more personalised smart care model. The enablers of such care models are the Internet of Things (IoT) and Artificial Intelligence (AI). These technologies collect and ana...
ver más
|
|
|
|
|
|
|
Dania Marabissi, Lorenzo Mucchi and Andrea Stomaci
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigm...
ver más
|
|
|
|
|
|
|
Krzysztof Golofit and Piotr Z. Wieczorek
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs). We propose an idea that the PUF cryptographic keys can ...
ver más
|
|
|
|
|
|
|
Raghav V. Sampangi,Srinivas Sampalli
Pág. 44 - 56
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat ? RFID tags have severe resourc...
ver más
|
|
|
|