Efficient private key generation from iris data for privacy and security applications

P Dash, F Pandey, M Sarma, D Samanta - Journal of Information Security …, 2023 - Elsevier
Private key generation based on biometric data is gaining popularity in several
cryptographic applications. Some key generation approaches using fingerprint and face …

Fingerprint bio‐key generation based on a deep neural network

Z Wu, Z Lv, J Kang, W Ding… - International Journal of …, 2022 - Wiley Online Library
With the increasing use of biometric identity authentication, biological key generation
technology is receiving much attention. A high‐strength key that is easy to store and manage …

Empirical studies of TESLA protocol: Properties, implementations, and replacement of public cryptography using biometric authentication

K Eledlebi, CY Yeun, E Damiani, Y Al-Hammadi - IEEE Access, 2022 - ieeexplore.ieee.org
This study discusses the general overview of Timed Efficient Stream Loss-tolerant
Authentication (TESLA) protocol, including its properties, key setups, and improvement …

Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol

K Eledlebi, A Alzubaidi, E Damiani… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The rapid integration of IoT devices into everyday decision-making processes underscores
the need for continuous user authentication and data integrity checking during network …

[HTML][HTML] An efficient authentication scheme syncretizing physical unclonable function and revocable biometrics in Industrial Internet of Things

X Yu, K Zhang, Z Suo, J Wang, W Wang… - Journal of King Saud …, 2024 - Elsevier
Biometric recognition is extensive for user security authentication in the Industrial Internet of
Things (IIoT). However, the potential leakage of biometric data has severe repercussions …

BIAS: A novel secure and efficient biometric-based anonymous authentication scheme

Q Zhu, L You, GR Hu, WN Liu - Computer Networks, 2024 - Elsevier
Currently, biometric-based authentication schemes are widely adopted in the field of online
payments. Consequently, this has led to an increasing number of people becoming …

Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications

P Dash, M Sarma, D Samanta - Security and Privacy, 2024 - Wiley Online Library
This study presents a novel approach for generating unique identities from multi‐modal
biometric data using ensemble feature descriptors extracted from the consistent regions of …

Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System

A Edrah, A Ouda - Computers, 2024 - mdpi.com
With our increasing reliance on technology, there is a growing demand for efficient and
seamless access control systems. Smartphone-centric biometric methods offer a diverse …

A Smart Card based Approach for Privacy Preservation Authentication of Non-Fungible Token using Non-Interactive Zero Knowledge Proof

MBA Dastagir, O Tariq, D Han - 2022 IEEE Smartworld …, 2022 - ieeexplore.ieee.org
The adaption of the NFT to the mainstream web3 marketplace has led to the rise of
challenges like authenticity and verification. On the other hand, privacy-preserving is one of …

[PDF][PDF] Cloud Based Attendance System

M Mehta, S Verma - 2024 - ir.juit.ac.in
Robust and secure authentication techniques are becoming increasingly important as the
digital landscape changes. The primary objective of this project is to design and build a safe …