A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

Biometrics and privacy-preservation: How do they evolve?

QN Tran, BP Turnbull, J Hu - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
The emerging field of privacy-preserving biometrics is attracting significant attention, as a
paradigm that can address several of the key concerns in cryptographic authentication …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security

G Panchal, D Samanta - Computers & Electrical Engineering, 2018 - Elsevier
Existing biometric-based security mechanisms to ensure storage security follow Biometric
Enrolment, Key Binding, Secure Sketch, Fuzzy vault or template store along with key of a …

Under-display ultrasonic fingerprint recognition with finger vessel imaging

C Peng, M Chen, X Jiang - IEEE Sensors Journal, 2021 - ieeexplore.ieee.org
While fingerprint technology has been widely used in mobile devices for user identification,
the existing fingerprint sensors can only capture 2D images of the fingerprint and are thus …

Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues

T Bhatia, AK Verma - The Journal of Supercomputing, 2017 - Springer
The incessant spurt of research activities to augment capabilities of resource-constrained
mobile devices by leveraging heterogeneous cloud resources has created a new research …

Novel anonymous authentication scheme using smart cards

JL Tsai, NW Lo, TC Wu - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
Smart card based authentication scheme has been widely utilized for various transaction-
oriented services such as electronic currency exchange, social insurance payment and e …

Identity authentication security management in mobile payment systems

F Wang, GB Shan, Y Chen, X Zheng… - Journal of Global …, 2020 - igi-global.com
Mobile payment is a new payment method offering users mobility, reachability, compatibility,
and convenience. But mobile payment involves great uncertainty and risk given its electronic …