The Emerging Challenges of Wearable Biometric Cryptosystems
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …
technologies is an emerging research area with significant potential for authentication and …
[HTML][HTML] User-empowered secure privacy-preserving authentication scheme for Digital Twin
Digital Twin (DT) is a revolutionary technology changing how a smart manufacturing industry
carries out its day-to-day activities. DT can provide numerous advantages such as real-time …
carries out its day-to-day activities. DT can provide numerous advantages such as real-time …
[HTML][HTML] Autonomous password generation and setting system with Cosmic Coding and Transfer (COSMOCAT) and Cosmic Time Calibrator (CTC)
HKM Tanaka, E Cantoni, G Cerretto, A Duffy… - Scientific Reports, 2025 - nature.com
As wireless sensor networks (WSNs) with Internet of Things (IoT) devices become
increasingly widespread and more complex, the threat of cyber-attacks is also increasing …
increasingly widespread and more complex, the threat of cyber-attacks is also increasing …
[PDF][PDF] An adaptive confidentiality security service enhancement protocol using image-based key generator for multi-agent ethernet packet switched networks
Conventional network Security Protocols provide different types of security services that
establish secure connections between network nodes making them robust against different …
establish secure connections between network nodes making them robust against different …
Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques
MI Hashem, K Alibraheemi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
A significant portion of today access controls rely on biometrics for authentication.
Biometrics, for instance, is utilized on commonplace devices like cellphones and computers …
Biometrics, for instance, is utilized on commonplace devices like cellphones and computers …
Distributed Ledger Technologies for Electronic Health Care: IOTA-Based Remote Patient Monitoring and Telemedicine System
NN Minhas, MW Mubeen, H Khawaja - Computer, 2023 - ieeexplore.ieee.org
We propose using IOTA in electronic health-care systems to ensure better adaptability,
anonymity, and compatibility. Quantitative results suggest that IOTA outperforms other …
anonymity, and compatibility. Quantitative results suggest that IOTA outperforms other …
Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network
The asymmetric cryptography techniques use in the field of data security suffer from the
challenge of maintaining the private key as secret. As a result, creating cryptographic keys …
challenge of maintaining the private key as secret. As a result, creating cryptographic keys …
[PDF][PDF] IMPLEMENTATION OF RSA 2048-BIT KEY GENERATION ALGORITHM IN NATIVE OS ON ARM-CORE INFINEON SLE97 PROCESSOR APPLIED IN DIGITAL …
Implementation of the public key cryptography algorithm on the specialized operating
system (OS) utilized in ensuring the security system is necessary. The construction of …
system (OS) utilized in ensuring the security system is necessary. The construction of …
Key generation method from fingerprint image based on deep convolutional neural network model
MI Hashem, KH Kuban - Nexo Revista Científica, 2023 - camjol.info
La biometría afecta nuestra vida. Las aplicaciones de seguridad emplean biometría. El
cifrado biométrico está creciendo. El cifrado requiere la creación de una clave biométrica …
cifrado biométrico está creciendo. El cifrado requiere la creación de una clave biométrica …
Smart Security in Smart City Using Naïve Bayes and RSA
R Roslina, BH Hayadi - Proceeding …, 2023 - prosiding-icostec.respati.ac.id
As all major cities adopt the concept of smart cities, concerns arise among the public
regarding data security and privacy. The constant threat of attacks on the confidentiality …
regarding data security and privacy. The constant threat of attacks on the confidentiality …