Prospects and applications of photonic neural networks

C Huang, VJ Sorger, M Miscuglio… - … in Physics: X, 2022 - Taylor & Francis
Neural networks have enabled applications in artificial intelligence through machine
learning, and neuromorphic computing. Software implementations of neural networks on …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

A comprehensive overview of biometric fusion

M Singh, R Singh, A Ross - Information Fusion, 2019 - Elsevier
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …

Privacy preserving face recognition utilizing differential privacy

MAP Chamikara, P Bertok, I Khalil, D Liu… - Computers & Security, 2020 - Elsevier
Facial recognition technologies are implemented in many areas, including but not limited to,
citizen surveillance, crime control, activity monitoring, and facial expression evaluation …

Methods and apparatus for rules-based multi-factor verification

K Alikhani - US Patent 9,426,132, 2016 - Google Patents
5,761.329 A 6, 1998 Chen et al. 2009/0320123 A1 12/2009 Yu et al. 6,463,474 B1 10/2002
Fuh et al. 2010.0005529 A1 1/2010 Hemade 6,671,812 B1 12/2003 Balasubramaniam et al …

Secure biometric authentication with de-duplication on distributed cloud storage

K Venkatachalam, P Prabu, A Almutairi… - PeerJ Computer …, 2021 - peerj.com
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …

Biometric systems utilising health data from wearable devices: Applications and future challenges in computer security

S Khan, S Parkinson, L Grant, N Liu… - ACM Computing Surveys …, 2020 - dl.acm.org
Health data are being increasingly sensed from the health-based wearable Internet of
Things (IoT) devices, providing much-needed fitness and health tracking. However, data …

A generic framework for three-factor authentication: Preserving security and privacy in distributed systems

X Huang, Y **ang, A Chonka, J Zhou… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
As part of the security within distributed systems, various services and resources need
protection from unauthorized use. Remote authentication is the most commonly used …

On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services

Q Jiang, J Ma, F Wei - IEEE systems journal, 2016 - ieeexplore.ieee.org
Recently, Tsai and Lo proposed a privacy aware authentication scheme for distributed
mobile cloud computing services. It is claimed that the scheme achieves mutual …