Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Multi-factor authentication: A survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …
enablers to maintain this process secure is authentication. It covers many different areas of a …
Design of secure mutual authentication scheme for metaverse environments using blockchain
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …
education and meetings has increased. However, since the conventional online …
[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …
2018 across the European Union, new legal requirements for the protection of personal data …
Security and accuracy of fingerprint-based biometrics: A review
Biometric systems are increasingly replacing traditional password-and token-based
authentication systems. Security and recognition accuracy are the two most important …
authentication systems. Security and recognition accuracy are the two most important …
Cancelable biometrics: A review
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …
Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint
A multimodal biometric system integrates information from more than one biometric modality
to improve the performance of each individual biometric system and make the system robust …
to improve the performance of each individual biometric system and make the system robust …
Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the
components of the Internet of Things, and will become globally addressable by any entity …
components of the Internet of Things, and will become globally addressable by any entity …
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …