[HTML][HTML] Sensor-based authentication in smartphone: A systematic review

ML Shuwandy, AS Jouda, MA Ahmed, MM Salih… - Journal of Engineering …, 2024 - Elsevier
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …

BAWS3TS: Browsing authentication web-based smartphone using 3D touchscreen sensor

ML Shuwandy, HA Aljubory… - 2022 IEEE 18th …, 2022 - ieeexplore.ieee.org
Modern mobile devices, especially smartphones, have developed rapidly and are widely
adopted by people of all ages. Smartphones can assist users in various activities, ie, from …

MagRing-SASB: Static authentication of magnetism sensor using semi-biometric interaction magnetic ring

AS Jouda, AM Sagheer… - 2021 IEEE 11th …, 2021 - ieeexplore.ieee.org
The Smartphone is one of the most well-known and widely used devices in contemporary
times for protecting private information. Biometric methods are one way for authenticating …

SDA Plus: improving the performance of the system determine algorithm (SDA) of the switching between AES-128 and AES-256 (MOLAZ method)

UW Abboud, ML Shuwandy - 2023 IEEE 13th International …, 2023 - ieeexplore.ieee.org
There are many encryption algorithms; some of them are strong but slow in decryption,
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …

Biometric authentication utilizing EEG based-on a smartphone's 3D touchscreen sensor

AY Younis, ML Shuwandy - 2023 IEEE 14th Control and System …, 2023 - ieeexplore.ieee.org
Recently, smartphone manufacturers have begun including large storage capacities and
powerful processors. Users' personal lives, professional lives, and vast multimedia …

Development MOLAZ Method in Multi Blocks: D3MB

UW Abboud, ML Shuwandy - 2023 IEEE 11th Conference on …, 2023 - ieeexplore.ieee.org
Data security and confidentiality are of utmost importance since sensitive information is
continually being sent through networks and kept on devices. Against illegal access and …

[CITAS][C] Semi-authorized Virtual Operating System

ML Shuwandy