Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …

Blockchain-based caller-id authentication (bbca): A novel solution to prevent spoofing attacks in voip/sip networks

IM Tas, S Baktir - IEEE access, 2024 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification)
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …

Enforcing End-to-End Security for Remote Conference Applications

Y Liu, H Chen, Z Yang - 2024 IEEE Symposium on Security and …, 2024 - ieeexplore.ieee.org
Remote conference applications are increasingly widely used, but currently, their improper
data encryption methods, proprietary implementations, and dial-in access cause concerns …

Enforcing End-to-End Security for Remote Conferencing

Y Liu, H Chen, Z Yang - 2024 IEEE Symposium on Security and …, 2024 - computer.org
Remote conference applications are increasingly widely used, but currently, their improper
data encryption methods, proprietary implementations, and dial-in access cause concerns …

CallerId Application Design using Amazon Web Services

S Chawla, M Abuzer, A Singh… - … on Advances in …, 2023 - ieeexplore.ieee.org
A phone number is a personal unique number which can identify its owner. Personal
information can be exploited through a person's phone number. Many methods such as …