Unimodal and multimodal biometric sensing systems: a review
Biometric systems are used for the verification and identification of individuals using their
physiological or behavioral features. These features can be categorized into unimodal and …
physiological or behavioral features. These features can be categorized into unimodal and …
User authentication schemes for wireless sensor networks: A review
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …
common to those which demand crucial security concerns. The deployment of WSNs in …
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
Improved two-factor user authentication in wireless sensor networks
B Vaidya, D Makrakis… - 2010 IEEE 6th International …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are considered due to the ubiquitous nature, ease of
deployment, and wide range of possible applications. WSNs can be deployed in unattended …
deployment, and wide range of possible applications. WSNs can be deployed in unattended …
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
Two‐factor mutual authentication with key agreement in wireless sensor networks
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended
environments, where a registered user can log in to the network and access data collected …
environments, where a registered user can log in to the network and access data collected …
A key distribution scheme using elliptic curve cryptography in wireless sensor networks
Wireless sensor networks (WSNs) have become increasingly popular in many applications
across a broad range of fields. Securing WSNs poses unique challenges mainly due to their …
across a broad range of fields. Securing WSNs poses unique challenges mainly due to their …
A novel RFID distance bounding protocol based on physically unclonable functions
Abstract Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (ie,
mafia, terrorist and distance frauds) when they are used for authentication purposes …
mafia, terrorist and distance frauds) when they are used for authentication purposes …
A taxonomy of various attacks on smart card–based applications and countermeasures
BB Gupta, M Quamara - Concurrency and Computation …, 2021 - Wiley Online Library
Deployment of smart card–based applications is becoming prevalent these days. Security of
these applications depends upon the nature of underlying hardware and software platforms …
these applications depends upon the nature of underlying hardware and software platforms …