[Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems

D Nigam, SN Patel, PMD Raj Vincent… - Journal of …, 2022 - Wiley Online Library
Secure identification is a critical system requirement for patients seeking health‐related
services. In the event of critical, aged, or disabled patients who require frequent health …

A BRIEF REVIEW ABOUT BIOMETRICS SYSTEMS IN MODERN CONTEXT.

H Caballero-Hernández, L Gil-Antonio… - International …, 2022 - search.ebscohost.com
Authentication systems employ various access mechanisms for the data validation process.
Nowadays there are many proposals focused on solving the traditional problems that exist to …

Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures

B Saha, MM Hasan, N Anjum, S Tahora… - arxiv preprint arxiv …, 2023 - arxiv.org
Blockchain technology transformed the digital sphere by providing a transparent, secure,
and decentralized platform for data security across a range of industries, including …

The Improvement of Elliptic Curve Factorization Method to Recover RSA's Prime Factors

K Somsuk - Symmetry, 2021 - mdpi.com
Elliptic Curve Factorization Method (ECM) is the general-purpose factoring method used in
the digital computer era. It is based on the medium length of the modulus; ECM is an efficient …

A secure authentication and access control scheme for coap-based iot

MA Obaidat, JL Choong… - 2022 5th Conference on …, 2022 - ieeexplore.ieee.org
The rapid and exponential deployment of Internet of things (IoT) that is connected to the
Internet has created an internet of vulnerabilities. The successful deployment in different …

Multi-Factor Authentication: A User Experience Study

S Baseer, KS Charumathi - Available at SSRN 4840295, 2024 - papers.ssrn.com
Usability issues prevent multi-factor authentication (MFA) systems from being widely used,
despite the fact that they are essential for improving security measures. This study explores …

An Advanced IoT Framework for Long Range Connectivity and Secure Data Transmission Leveraging LoRa and ASCON Encryption

M Nooruddin, D Valles - 2023 IEEE World AI IoT Congress …, 2023 - ieeexplore.ieee.org
In the rapidly evolving Internet-of-Things (IoT) landscape, the need for long-range
communication and robust security measures has become paramount. This paper presents …

A novel paradigm for access control trust in iot applications: A distributed cross-communication approach

MA Obaidat, J Brown… - 2021 13th IFIP Wireless …, 2021 - ieeexplore.ieee.org
How to best secure communications between IoT devices remains a challenging research
area. However, the heterodox nature of individual IoT devices and its limited capabilities …

An improvement for CAST-128 encryption based on magic square and matrix inversion

SM Kareem, A Al-Adhami, AMS Rahma - Bulletin of Electrical Engineering …, 2024 - beei.org
This paper presents two image encryption methods which aim to improve the CAST 128-bit
algorithm by increasing the security level of encrypted images. The first improvement uses a …

Hybrid encryption technique: Integrating the neural network with distortion techniques

R Abu Zitar, MJ Al-Muhammed - Plos one, 2022 - journals.plos.org
This paper proposes a hybrid technique for data security. The computational model of the
technique is grounded on both the non-linearity of neural network manipulations and the …