[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …

A review of privacy-preserving biometric identification and authentication protocols

L Zeng, P Shen, X Zhu, X Tian, C Chen - Computers & Security, 2025 - Elsevier
Biometrics now play a crucial role in user identification and authentication. However, storing
biometric features in plaintext and conducting authentication without protection pose a risk of …

Validating Privacy-Preserving Face Recognition under a Minimum Assumption

H Zhang, X Dong, YL Lai, Y Zhou… - Proceedings of the …, 2024 - openaccess.thecvf.com
The widespread use of cloud-based face recognition technology raises privacy concerns as
unauthorized access to face images can expose personal information or be exploited for …

Privacy-preserving Multi-biometric Indexing based on Frequent Binary Patterns

D Osorio-Roig, LJ González-Soler… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The development of large-scale identification systems that ensure the privacy protection of
enrolled subjects represents a major challenge. Biometric deployments that provide …

HEBI: Homomorphically encrypted biometric indexing

P Bauspieß, M Grimmer, C Fougner… - … Joint Conference on …, 2023 - ieeexplore.ieee.org
Biometric data stored in automated recognition systems are at risk of attacks. This is
particularly true for large-scale biometric identification systems, where the reference …

Multi-Receiver Data Authorization With Data Search for Data Sharing in Cloud-Assisted IoV

W Li - IEEE Transactions on Intelligent Transportation …, 2024 - ieeexplore.ieee.org
As technology advances in network technology, the Internet of Vehicles (IoV) has emerged
as a prevalent solution for collecting and processing data in Intelligent Transportation …

The Cross-Impact Between Cryptography and Artificial Intelligence: A Highlight

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Here we try to highlight the existence of an inseparable coupling between cryptography and
AI visible in recent research literature. To this end, we first try to develop minimal ecosystems …

[BOOK][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

Impact of 5G Security on Smart Cities' Internet of Things Implementation

W Shafik, K Kalinaki - … in Modeling and Management: Insights in …, 2024 - igi-global.com
Smart cities are imperative in terms of smart buildings, transportation, parking, healthcare,
agriculture, traffic systems, and public safety aided by the fifth generation (5G) computation …

Evaluation of Cache Sharing Method using User's Store-Visiting History for Large-Scale Biometric Authentication System

Y Hanada, N Abe, S Yamada - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Biometric authentication—a highly convenient and safe authentication method—is gaining
attention, especially, 1: N authentication that identifies persons only through biometric …