Efficient private key generation from iris data for privacy and security applications
Private key generation based on biometric data is gaining popularity in several
cryptographic applications. Some key generation approaches using fingerprint and face …
cryptographic applications. Some key generation approaches using fingerprint and face …
Fingerprint bio‐key generation based on a deep neural network
Z Wu, Z Lv, J Kang, W Ding… - International Journal of …, 2022 - Wiley Online Library
With the increasing use of biometric identity authentication, biological key generation
technology is receiving much attention. A high‐strength key that is easy to store and manage …
technology is receiving much attention. A high‐strength key that is easy to store and manage …
Empirical studies of TESLA protocol: Properties, implementations, and replacement of public cryptography using biometric authentication
This study discusses the general overview of Timed Efficient Stream Loss-tolerant
Authentication (TESLA) protocol, including its properties, key setups, and improvement …
Authentication (TESLA) protocol, including its properties, key setups, and improvement …
Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol
The rapid integration of IoT devices into everyday decision-making processes underscores
the need for continuous user authentication and data integrity checking during network …
the need for continuous user authentication and data integrity checking during network …
[HTML][HTML] An efficient authentication scheme syncretizing physical unclonable function and revocable biometrics in Industrial Internet of Things
X Yu, K Zhang, Z Suo, J Wang, W Wang… - Journal of King Saud …, 2024 - Elsevier
Biometric recognition is extensive for user security authentication in the Industrial Internet of
Things (IIoT). However, the potential leakage of biometric data has severe repercussions …
Things (IIoT). However, the potential leakage of biometric data has severe repercussions …
BIAS: A novel secure and efficient biometric-based anonymous authentication scheme
Q Zhu, L You, GR Hu, WN Liu - Computer Networks, 2024 - Elsevier
Currently, biometric-based authentication schemes are widely adopted in the field of online
payments. Consequently, this has led to an increasing number of people becoming …
payments. Consequently, this has led to an increasing number of people becoming …
Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications
This study presents a novel approach for generating unique identities from multi‐modal
biometric data using ensemble feature descriptors extracted from the consistent regions of …
biometric data using ensemble feature descriptors extracted from the consistent regions of …
Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System
A Edrah, A Ouda - Computers, 2024 - mdpi.com
With our increasing reliance on technology, there is a growing demand for efficient and
seamless access control systems. Smartphone-centric biometric methods offer a diverse …
seamless access control systems. Smartphone-centric biometric methods offer a diverse …
A Smart Card based Approach for Privacy Preservation Authentication of Non-Fungible Token using Non-Interactive Zero Knowledge Proof
The adaption of the NFT to the mainstream web3 marketplace has led to the rise of
challenges like authenticity and verification. On the other hand, privacy-preserving is one of …
challenges like authenticity and verification. On the other hand, privacy-preserving is one of …
[PDF][PDF] Cloud Based Attendance System
M Mehta, S Verma - 2024 - ir.juit.ac.in
Robust and secure authentication techniques are becoming increasingly important as the
digital landscape changes. The primary objective of this project is to design and build a safe …
digital landscape changes. The primary objective of this project is to design and build a safe …