Using machine learning for dynamic authentication in telehealth: A tutorial
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …
remote locations and at their homes via smart devices and 5G systems. Protecting the …
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …
popularity at growing rates while improvement in security has fallen behind. As smartphones …
[HTML][HTML] Lightweight deep learning model to secure authentication in Mobile Cloud Computing
The present paper suggests a hybrid solution to address two key authentication challenges:
data privacy and the limitations of mobile devices resources. The former is addressed using …
data privacy and the limitations of mobile devices resources. The former is addressed using …
Using a fine-tuning method for a deep authentication in mobile cloud computing based on Tensorflow Lite framework
Remarkable progress in the areas of deep learning and the mobile cloud environment. The
security has become most challenging part on mobile cloud., this is due to the growth of …
security has become most challenging part on mobile cloud., this is due to the growth of …
A survey on privacy and security in mobile cloud computing
Mobile cloud computing (MCC) is one of the significant inventions in the field of information
technology that empowers mobile applications by strengthening computational strength and …
technology that empowers mobile applications by strengthening computational strength and …
Une approche basée sur des techniques biométriques pour la sécurité dans l'environnement du Mobile Cloud Computing
A Zeroual - 2022 - dspace.univ-tebessa.dz
De nos jours, les gens utilisent de plus en plus des appareils mobiles puissants et
intelligents, et leur utilisation est déterminée par le et le type des utilisateurs dans plusieurs …
intelligents, et leur utilisation est déterminée par le et le type des utilisateurs dans plusieurs …
[PDF][PDF] Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …
remote locations and at their homes via smart devices and 5G systems. Protecting the …
[PDF][PDF] MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME
SA Abdulrahman, MF Al-Gailani - Iraqi Journal of Information and …, 2022 - iasj.net
With the rapid growth of cloud computing and the expansion of mobile phone users in recent
years, mobile cloud computing has attracted wide attention. Wireless computing networks …
years, mobile cloud computing has attracted wide attention. Wireless computing networks …
[PDF][PDF] Cybersecurity in Blockchain by Secure Identity Management using Long Short Term Memory (LSTM)
DN Kirupanithi, A Antonidoss, G Subathra… - researchgate.net
One of the major technologies in delivering infrastructure and data service requirements at
low cost and with minimal effort is Cloud Computing (CC), which has been implemented in …
low cost and with minimal effort is Cloud Computing (CC), which has been implemented in …
[DOC][DOC] Study Of Introduction Of Biometrics (Eye Retina Scan) In Mobile Banking Application with the help of Community Cloud Computing in India.
K Shivhare, B RAYMOND - researchgate.net
The motive of the current research work is to examine the adoption of Eye-Retina Biometric
scan as a possible solution to counter the security threats to Indian mobile banking …
scan as a possible solution to counter the security threats to Indian mobile banking …