Opportunistic multi-modal user authentication for health-tracking IoT wearables
With the advancement of technologies, market wearables are becoming increasingly
popular with a range of services, including providing access to bank accounts, accessing …
popular with a range of services, including providing access to bank accounts, accessing …
Secure biometric lock system for files and applications: a review
A biometric system is a develo** innovation which is utilized in different fields like
forensics and security system. Finger recognition is the innovation that confirms the …
forensics and security system. Finger recognition is the innovation that confirms the …
A three-step authentication model for mobile phone user using keystroke dynamics
The use of keystroke dynamics for user authentication has evolved over the years and has
found its application in mobile phones. But the primary challenge with mobile phones is that …
found its application in mobile phones. But the primary challenge with mobile phones is that …
Area and power efficient post-quantum cryptosystem for IoT resource-constrained devices
Abstract Internet of Things (IoT) connects a myriad of small devices over a huge network,
encompassing many different and varied applications and environments. As the IoT network …
encompassing many different and varied applications and environments. As the IoT network …
Configurable mixed-radix number theoretic transform architecture for lattice-based cryptography
Lattice-based cryptography continues to dominate in the second-round finalists of the
National Institute of Standards and Technology post-quantum cryptography standardization …
National Institute of Standards and Technology post-quantum cryptography standardization …
Efficient NewHope cryptography based facial security system on a GPU
With explosive era of machine learning development, human data, such as biometric
images, videos, and particularly facial information, have become an essential training …
images, videos, and particularly facial information, have become an essential training …
mWIoTAuth: Multi-wearable data-driven implicit IoT authentication
Due to the advancement of wearables and the Internet of Things (IoT), end-users are using a
range of wearables, such as smartwatches, fitness bands, and smart glasses, to receive a …
range of wearables, such as smartwatches, fitness bands, and smart glasses, to receive a …
Novel robust photoplethysmogram-based authentication
As the tremendous advances in the biosensing technology, the biometric authentication
approach has been adopted to replace the conventional password-based systems. Due to …
approach has been adopted to replace the conventional password-based systems. Due to …
A survey of software implementations for the number theoretic transform
This survey summarizes the software implementation knowledge of the Number Theoretic
Transform (NTT)—a major subroutine of lattice-based cryptosystems. The NTT is a special …
Transform (NTT)—a major subroutine of lattice-based cryptosystems. The NTT is a special …
Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces
Brain-Computer Interfaces (BCIs) are used in various application scenarios allowing direct
communication between the brain and computers. Specifically, electroencephalography …
communication between the brain and computers. Specifically, electroencephalography …