BAKA: Biometric authentication and key agreement scheme based on fuzzy extractor for wireless body area networks

S Zhang, Z Yan, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Biometric and password-based two-factor authentication has received attention from the
community over the past decades because of its simplicity, portability, and robustness. In …

A review of privacy-preserving biometric identification and authentication protocols

L Zeng, P Shen, X Zhu, X Tian, C Chen - Computers & Security, 2025 - Elsevier
Biometrics now play a crucial role in user identification and authentication. However, storing
biometric features in plaintext and conducting authentication without protection pose a risk of …

Device-Side Lightweight Mutual Authentication and Key Agreement Scheme based on Chameleon Hashing for Industrial Internet of Things

Q Zhang, X Zhou, H Zhong, J Cui… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Several authentication and key agreement (AKA) schemes have been proposed to ensure
secure communication in the Industrial Internet of Things (IIoT). However, most of these …

The tables have turned: GPT-3 distinguishing passwords from honeywords

N Chakraborty, Y Yamout… - 2023 IEEE Conference …, 2023 - ieeexplore.ieee.org
In the field of information security, there has been a noteworthy trend toward leveraging
machine learning models to develop and exploit security solutions. The emergence of …

QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks

MM Mathews, V Panchami - Journal of Information Security and …, 2024 - Elsevier
Delay tolerant networks supporting heterogeneous communication are a promising network
architecture solution that can meet today's communication requirements involving nodes in …

[HTML][HTML] Provably secure biometric and PUF-based authentication for roaming service in global mobility network

EH Nurkifli - Alexandria Engineering Journal, 2025 - Elsevier
Abstract The Global Mobility Network (GLOMONET) is crucial in the context of the Internet of
Things (IoT) as it enables users to connect to the Internet from anywhere, anytime. However …

PEBASI: a privacy preserving, efficient biometric authentication scheme based on irises

H Gunasinghe, M Atallah, E Bertino - ACM Transactions on Privacy and …, 2024 - dl.acm.org
We introduce a novel privacy-preserving biometric authentication scheme based on irises
that allows a user to enroll once at a trusted biometric certification authority (BCA) and …

PRIDA-ME: A Privacy-Preserving, Interoperable and Decentralized Authentication Scheme for Metaverse Environment

M ul Hassan, Y Abbas, W Iqbal… - IEEE Open Journal of …, 2025 - ieeexplore.ieee.org
The metaverse is a new virtual world that has the potential to significantly impact our
interactions with digital content and with each other. It is a shared virtual environment where …

Privacy-preserving correlation-based multi-instance iris verification on malicious server using Cheon-Kim-Kim-Song fully homomorphic encryption

GS Arepalli, P Boobalan - Journal of Electronic Imaging, 2024 - spiedigitallibrary.org
Homomorphic encryption (HE) has emerged as a prominent research focus in the
development of privacy-preserving biometric authentication systems, offering advantages …