The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

[HTML][HTML] User-empowered secure privacy-preserving authentication scheme for Digital Twin

C Patel, A Pasikhani, P Gope, J Clark - Computers & Security, 2024 - Elsevier
Digital Twin (DT) is a revolutionary technology changing how a smart manufacturing industry
carries out its day-to-day activities. DT can provide numerous advantages such as real-time …

[HTML][HTML] Autonomous password generation and setting system with Cosmic Coding and Transfer (COSMOCAT) and Cosmic Time Calibrator (CTC)

HKM Tanaka, E Cantoni, G Cerretto, A Duffy… - Scientific Reports, 2025 - nature.com
As wireless sensor networks (WSNs) with Internet of Things (IoT) devices become
increasingly widespread and more complex, the threat of cyber-attacks is also increasing …

[PDF][PDF] An adaptive confidentiality security service enhancement protocol using image-based key generator for multi-agent ethernet packet switched networks

JF Abukhait, MS Saleh - International Journal of Electrical and Electronic …, 2023 - ijeetc.com
Conventional network Security Protocols provide different types of security services that
establish secure connections between network nodes making them robust against different …

Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques

MI Hashem, K Alibraheemi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
A significant portion of today access controls rely on biometrics for authentication.
Biometrics, for instance, is utilized on commonplace devices like cellphones and computers …

Distributed Ledger Technologies for Electronic Health Care: IOTA-Based Remote Patient Monitoring and Telemedicine System

NN Minhas, MW Mubeen, H Khawaja - Computer, 2023 - ieeexplore.ieee.org
We propose using IOTA in electronic health-care systems to ensure better adaptability,
anonymity, and compatibility. Quantitative results suggest that IOTA outperforms other …

Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network

D Maiti, M Basak, D Das - Congress on Intelligent Systems, 2023 - Springer
The asymmetric cryptography techniques use in the field of data security suffer from the
challenge of maintaining the private key as secret. As a result, creating cryptographic keys …

[PDF][PDF] IMPLEMENTATION OF RSA 2048-BIT KEY GENERATION ALGORITHM IN NATIVE OS ON ARM-CORE INFINEON SLE97 PROCESSOR APPLIED IN DIGITAL …

NHUQ LUC, TATT NGUYEN, TT DAO - SCIENCE, 2023 - sjt.madi.ru
Implementation of the public key cryptography algorithm on the specialized operating
system (OS) utilized in ensuring the security system is necessary. The construction of …

Key generation method from fingerprint image based on deep convolutional neural network model

MI Hashem, KH Kuban - Nexo Revista Científica, 2023 - camjol.info
La biometría afecta nuestra vida. Las aplicaciones de seguridad emplean biometría. El
cifrado biométrico está creciendo. El cifrado requiere la creación de una clave biométrica …

Smart Security in Smart City Using Naïve Bayes and RSA

R Roslina, BH Hayadi - Proceeding …, 2023 - prosiding-icostec.respati.ac.id
As all major cities adopt the concept of smart cities, concerns arise among the public
regarding data security and privacy. The constant threat of attacks on the confidentiality …