Opportunistic multi-modal user authentication for health-tracking IoT wearables

A Muratyan, W Cheung, SV Dibbo… - The Fifth International …, 2022 - Springer
With the advancement of technologies, market wearables are becoming increasingly
popular with a range of services, including providing access to bank accounts, accessing …

Secure biometric lock system for files and applications: a review

Z Ishak, N Rajendran, OI Al-Sanjary… - 2020 16th IEEE …, 2020 - ieeexplore.ieee.org
A biometric system is a develo** innovation which is utilized in different fields like
forensics and security system. Finger recognition is the innovation that confirms the …

A three-step authentication model for mobile phone user using keystroke dynamics

BS Saini, P Singh, A Nayyar, N Kaur, KS Bhatia… - IEEE …, 2020 - ieeexplore.ieee.org
The use of keystroke dynamics for user authentication has evolved over the years and has
found its application in mobile phones. But the primary challenge with mobile phones is that …

Area and power efficient post-quantum cryptosystem for IoT resource-constrained devices

K Shahbazi, SB Ko - Microprocessors and Microsystems, 2021 - Elsevier
Abstract Internet of Things (IoT) connects a myriad of small devices over a huge network,
encompassing many different and varied applications and environments. As the IoT network …

Configurable mixed-radix number theoretic transform architecture for lattice-based cryptography

P Duong-Ngoc, H Lee - IEEE Access, 2022 - ieeexplore.ieee.org
Lattice-based cryptography continues to dominate in the second-round finalists of the
National Institute of Standards and Technology post-quantum cryptography standardization …

Efficient NewHope cryptography based facial security system on a GPU

P Duong-Ngoc, TN Tan, H Lee - IEEE Access, 2020 - ieeexplore.ieee.org
With explosive era of machine learning development, human data, such as biometric
images, videos, and particularly facial information, have become an essential training …

mWIoTAuth: Multi-wearable data-driven implicit IoT authentication

S Vhaduri, SV Dibbo, A Muratyan, W Cheung - Future Generation …, 2024 - Elsevier
Due to the advancement of wearables and the Internet of Things (IoT), end-users are using a
range of wearables, such as smartwatches, fitness bands, and smart glasses, to receive a …

Novel robust photoplethysmogram-based authentication

L Pu, PJ Chacon, HC Wu, JW Choi - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
As the tremendous advances in the biosensing technology, the biometric authentication
approach has been adopted to replace the conventional password-based systems. Due to …

A survey of software implementations for the number theoretic transform

AC Mert, F Yaman, E Karabulut, E Öztürk… - … on Embedded Computer …, 2023 - Springer
This survey summarizes the software implementation knowledge of the Number Theoretic
Transform (NTT)—a major subroutine of lattice-based cryptosystems. The NTT is a special …

Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces

EL Bernal, SL Bernal, GM Pérez… - arxiv preprint arxiv …, 2023 - arxiv.org
Brain-Computer Interfaces (BCIs) are used in various application scenarios allowing direct
communication between the brain and computers. Specifically, electroencephalography …