BAKA: Biometric authentication and key agreement scheme based on fuzzy extractor for wireless body area networks
Biometric and password-based two-factor authentication has received attention from the
community over the past decades because of its simplicity, portability, and robustness. In …
community over the past decades because of its simplicity, portability, and robustness. In …
A review of privacy-preserving biometric identification and authentication protocols
L Zeng, P Shen, X Zhu, X Tian, C Chen - Computers & Security, 2025 - Elsevier
Biometrics now play a crucial role in user identification and authentication. However, storing
biometric features in plaintext and conducting authentication without protection pose a risk of …
biometric features in plaintext and conducting authentication without protection pose a risk of …
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme based on Chameleon Hashing for Industrial Internet of Things
Several authentication and key agreement (AKA) schemes have been proposed to ensure
secure communication in the Industrial Internet of Things (IIoT). However, most of these …
secure communication in the Industrial Internet of Things (IIoT). However, most of these …
The tables have turned: GPT-3 distinguishing passwords from honeywords
In the field of information security, there has been a noteworthy trend toward leveraging
machine learning models to develop and exploit security solutions. The emergence of …
machine learning models to develop and exploit security solutions. The emergence of …
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks
Delay tolerant networks supporting heterogeneous communication are a promising network
architecture solution that can meet today's communication requirements involving nodes in …
architecture solution that can meet today's communication requirements involving nodes in …
[HTML][HTML] Provably secure biometric and PUF-based authentication for roaming service in global mobility network
EH Nurkifli - Alexandria Engineering Journal, 2025 - Elsevier
Abstract The Global Mobility Network (GLOMONET) is crucial in the context of the Internet of
Things (IoT) as it enables users to connect to the Internet from anywhere, anytime. However …
Things (IoT) as it enables users to connect to the Internet from anywhere, anytime. However …
PEBASI: a privacy preserving, efficient biometric authentication scheme based on irises
We introduce a novel privacy-preserving biometric authentication scheme based on irises
that allows a user to enroll once at a trusted biometric certification authority (BCA) and …
that allows a user to enroll once at a trusted biometric certification authority (BCA) and …
PRIDA-ME: A Privacy-Preserving, Interoperable and Decentralized Authentication Scheme for Metaverse Environment
M ul Hassan, Y Abbas, W Iqbal… - IEEE Open Journal of …, 2025 - ieeexplore.ieee.org
The metaverse is a new virtual world that has the potential to significantly impact our
interactions with digital content and with each other. It is a shared virtual environment where …
interactions with digital content and with each other. It is a shared virtual environment where …
Privacy-preserving correlation-based multi-instance iris verification on malicious server using Cheon-Kim-Kim-Song fully homomorphic encryption
GS Arepalli, P Boobalan - Journal of Electronic Imaging, 2024 - spiedigitallibrary.org
Homomorphic encryption (HE) has emerged as a prominent research focus in the
development of privacy-preserving biometric authentication systems, offering advantages …
development of privacy-preserving biometric authentication systems, offering advantages …