[Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems
D Nigam, SN Patel, PMD Raj Vincent… - Journal of …, 2022 - Wiley Online Library
Secure identification is a critical system requirement for patients seeking health‐related
services. In the event of critical, aged, or disabled patients who require frequent health …
services. In the event of critical, aged, or disabled patients who require frequent health …
A BRIEF REVIEW ABOUT BIOMETRICS SYSTEMS IN MODERN CONTEXT.
Authentication systems employ various access mechanisms for the data validation process.
Nowadays there are many proposals focused on solving the traditional problems that exist to …
Nowadays there are many proposals focused on solving the traditional problems that exist to …
Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures
Blockchain technology transformed the digital sphere by providing a transparent, secure,
and decentralized platform for data security across a range of industries, including …
and decentralized platform for data security across a range of industries, including …
The Improvement of Elliptic Curve Factorization Method to Recover RSA's Prime Factors
K Somsuk - Symmetry, 2021 - mdpi.com
Elliptic Curve Factorization Method (ECM) is the general-purpose factoring method used in
the digital computer era. It is based on the medium length of the modulus; ECM is an efficient …
the digital computer era. It is based on the medium length of the modulus; ECM is an efficient …
A secure authentication and access control scheme for coap-based iot
MA Obaidat, JL Choong… - 2022 5th Conference on …, 2022 - ieeexplore.ieee.org
The rapid and exponential deployment of Internet of things (IoT) that is connected to the
Internet has created an internet of vulnerabilities. The successful deployment in different …
Internet has created an internet of vulnerabilities. The successful deployment in different …
Multi-Factor Authentication: A User Experience Study
S Baseer, KS Charumathi - Available at SSRN 4840295, 2024 - papers.ssrn.com
Usability issues prevent multi-factor authentication (MFA) systems from being widely used,
despite the fact that they are essential for improving security measures. This study explores …
despite the fact that they are essential for improving security measures. This study explores …
An Advanced IoT Framework for Long Range Connectivity and Secure Data Transmission Leveraging LoRa and ASCON Encryption
In the rapidly evolving Internet-of-Things (IoT) landscape, the need for long-range
communication and robust security measures has become paramount. This paper presents …
communication and robust security measures has become paramount. This paper presents …
A novel paradigm for access control trust in iot applications: A distributed cross-communication approach
How to best secure communications between IoT devices remains a challenging research
area. However, the heterodox nature of individual IoT devices and its limited capabilities …
area. However, the heterodox nature of individual IoT devices and its limited capabilities …
An improvement for CAST-128 encryption based on magic square and matrix inversion
This paper presents two image encryption methods which aim to improve the CAST 128-bit
algorithm by increasing the security level of encrypted images. The first improvement uses a …
algorithm by increasing the security level of encrypted images. The first improvement uses a …
Hybrid encryption technique: Integrating the neural network with distortion techniques
R Abu Zitar, MJ Al-Muhammed - Plos one, 2022 - journals.plos.org
This paper proposes a hybrid technique for data security. The computational model of the
technique is grounded on both the non-linearity of neural network manipulations and the …
technique is grounded on both the non-linearity of neural network manipulations and the …