A review on protection and cancelable techniques in biometric systems
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …
constituted by the mechanisms which provide access to a number of services or …
Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …
purpose of this investigation is to summarise the factors that hinder biometrics models' …
Biometrics and privacy-preservation: How do they evolve?
QN Tran, BP Turnbull, J Hu - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
The emerging field of privacy-preserving biometrics is attracting significant attention, as a
paradigm that can address several of the key concerns in cryptographic authentication …
paradigm that can address several of the key concerns in cryptographic authentication …
Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …
mobile devices. We start by providing an overview of existing survey articles published in the …
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …
accentuated after the second decade of this century, has been motivated by the growing …
A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security
G Panchal, D Samanta - Computers & Electrical Engineering, 2018 - Elsevier
Existing biometric-based security mechanisms to ensure storage security follow Biometric
Enrolment, Key Binding, Secure Sketch, Fuzzy vault or template store along with key of a …
Enrolment, Key Binding, Secure Sketch, Fuzzy vault or template store along with key of a …
Under-display ultrasonic fingerprint recognition with finger vessel imaging
While fingerprint technology has been widely used in mobile devices for user identification,
the existing fingerprint sensors can only capture 2D images of the fingerprint and are thus …
the existing fingerprint sensors can only capture 2D images of the fingerprint and are thus …
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
The incessant spurt of research activities to augment capabilities of resource-constrained
mobile devices by leveraging heterogeneous cloud resources has created a new research …
mobile devices by leveraging heterogeneous cloud resources has created a new research …
Novel anonymous authentication scheme using smart cards
JL Tsai, NW Lo, TC Wu - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
Smart card based authentication scheme has been widely utilized for various transaction-
oriented services such as electronic currency exchange, social insurance payment and e …
oriented services such as electronic currency exchange, social insurance payment and e …
Identity authentication security management in mobile payment systems
Mobile payment is a new payment method offering users mobility, reachability, compatibility,
and convenience. But mobile payment involves great uncertainty and risk given its electronic …
and convenience. But mobile payment involves great uncertainty and risk given its electronic …