Linked or unlinked: A systematic review of linkable ring signature schemes

J Odoom, X Huang, Z Zhou, S Danso, J Zheng… - Journal of Systems …, 2023 - Elsevier
As a prominent cryptographic primitive underlying anonymous communication, privacy-
preserving cryptocurrencies, and other blockchain-based applications, ring signatures have …

An improved long short term memory network for intrusion detection

AA Awad, AF Ali, T Gaber - Plos one, 2023 - journals.plos.org
Over the years, intrusion detection system has played a crucial role in network security by
discovering attacks from network traffics and generating an alarm signal to be sent to the …

On Some Novel Results about Split‐Complex Numbers, the Diagonalization Problem, and Applications to Public Key Asymmetric Cryptography

M Merkepci, M Abobala - Journal of Mathematics, 2023 - Wiley Online Library
In this paper, we present some of the foundational concepts of split‐complex number theory
such as split‐complex divison, gcd, and congruencies. Also, we prove that Euler's theorem is …

[PDF][PDF] On a novel security scheme for the encryption and decryption Of 2×2 fuzzy matrices with rational entries based on the algebra of neutrosophic integers and El …

M Abobala, A Allouf - Neutrosophic sets and systems, 2023 - fs.unm.edu
The main goal behind mathematical cryptography is to keep messages and multimedia
messages secret at a time when modern means of communication have spread and become …

Deep cancelable multibiometric finger vein and fingerprint authentication with non-negative matrix factorization

M Hammad, MA Wani, KA Shakil, H Shaiba… - IEEE …, 2024 - ieeexplore.ieee.org
Biometric authentication technologies, which use physiological and behavioral traits to verify
identity, have added a new layer of protection. However, concerns about privacy, security …

[Retracted] Deformation Adjustment with Single Real Signature Image for Biometric Verification Using CNN

R Kumar, M Saraswat, D Ather… - Computational …, 2022 - Wiley Online Library
Signature verification is the widely used biometric verification method for maintaining
individual privacy. It is generally used in legal documents and in financial transactions. A …

FinTem: A secure and non-invertible technique for fingerprint template protection

A Hayat, SS Ali, AK Bhateja, N Werghi - Computers & Security, 2024 - Elsevier
In today's automated society, authentication has become a necessity. Fingerprint-based
authentication is the predominant choice due to its advantages. However, existing biometric …

Residual current detection method based on improved VMD-BPNN

Y Bai, X Zhang, Y Wang, L Wang, Q Wei, W Zhao - Plos one, 2024 - journals.plos.org
To further enhance the residual current detection capability of low-voltage distribution
networks, an improved adaptive residual current detection method that combines variational …

Second-order convolutional networks for iris recognition

L Jia, X Shi, Q Sun, X Tang, P Li - Applied Intelligence, 2022 - Springer
Iris recognition in less constrained environments is challenging as the images taken therein
contain severe noisy factors. How to represent iris texture for accurate and robust …

Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques

MI Hashem, K Alibraheemi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
A significant portion of today access controls rely on biometrics for authentication.
Biometrics, for instance, is utilized on commonplace devices like cellphones and computers …