[HTML][HTML] Sensor-based authentication in smartphone: A systematic review

ML Shuwandy, AS Jouda, MA Ahmed, MM Salih… - Journal of Engineering …, 2024 - Elsevier
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …

[HTML][HTML] Defensive strategies against PCC attacks based on ideal (t, n)-secret sharing scheme

S Ali, J Wang, VCM Leung - Journal of King Saud University-Computer and …, 2023 - Elsevier
We present a method to increase the dependability of cloud-based applications. Traditional
Secret Sharing Schemes (SSSs) typically fail to counter the challenges brought on by …

Machine Learning and Metaheuristic Algorithms for Voice-Based Authentication: A Mobile Banking Case Study

L Nosrati, AM Bidgoli, HHS Javadi - International Journal of Computational …, 2024 - Springer
These days, every bank requires secure identification before granting access to personal
accounts. Voice authentication is increasingly popular for important mobile processes. The …

SDA Plus: improving the performance of the system determine algorithm (SDA) of the switching between AES-128 and AES-256 (MOLAZ method)

UW Abboud, ML Shuwandy - 2023 IEEE 13th International …, 2023 - ieeexplore.ieee.org
There are many encryption algorithms; some of them are strong but slow in decryption,
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …

The effectiveness of animation media on the language skills of class v students

YA Sidabutar, LME Manihuruk… - International Journal of …, 2024 - ijmaberjournal.org
This research aims to see the effectiveness of animation media on the language skills of
class V students at SDN 091537 Pematangsiantar. This research will be carried out in class …

[PDF][PDF] Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps.

M Bilal, SC Showngwe, A Bashir… - Computers, Materials & …, 2023 - researchgate.net
To secure web applications from Man-In-The-Middle (MITM) and phishing attacks is a
challenging task nowadays. For this purpose, authentication protocol plays a vital role in …

Machine Learning and Deep Learning Techniques for Distinguishing Between Genuine Users and Impostors in EEG-Based Authentication Using Pattern Lock

AY Younis, ML Shuwandy - 2024 8th International Symposium …, 2024 - ieeexplore.ieee.org
Traditional validation methods are vulnerable to different security risks, rendering them less
dependable in protecting confidential information. EEG-based biometric systems offer a …

Biometric authentication utilizing EEG based-on a smartphone's 3D touchscreen sensor

AY Younis, ML Shuwandy - 2023 IEEE 14th Control and System …, 2023 - ieeexplore.ieee.org
Recently, smartphone manufacturers have begun including large storage capacities and
powerful processors. Users' personal lives, professional lives, and vast multimedia …

Solving drinking-water challenges: Supply and temperature in a smart poultry monitoring system using iot system

AY Mohammed, HA Hussein, ML Shuwandy - International Conference on …, 2022 - Springer
Poultry faces many problems that affect the life and productivity of chickens, including the
traditional water supply. When the drinking water temperature for chickens increases, the …

Enhancing Smartphone Authentication by Integrating Decision-Making Model with Touch Pressure, Finger Location Data, and Advanced Cybersecurity Techniques

MM Hamood, ML Shuwandy… - Iraqi Journal for …, 2024 - ijcsm.researchcommons.org
Smartphone authentication methods face significant challenges in achieving high accuracy,
robustness, and usability within cybersecurity applications. Traditional methods, such as …