Cancelable Iris template for secure authentication based on random projection and double random phase encoding
Biometric recognition approaches have overwhelmed major issues in traditional
authentication systems. Privacy invasion and security are the needed features in the …
authentication systems. Privacy invasion and security are the needed features in the …
Enhanced biometric recognition for secure authentication using iris preprocessing and hyperelliptic curve cryptography
V Rajasekar, J Premalatha… - … and mobile computing, 2020 - Wiley Online Library
Biometrics combined with cryptography can be employed to solve the conceptual and
factual identity frauds in digital authentication. Biometric traits are proven to provide …
factual identity frauds in digital authentication. Biometric traits are proven to provide …
[PDF][PDF] Multi-factor signcryption scheme for secure authentication using hyper elliptic curve cryptography and bio-hash function
Among rapid development of wireless communication, technology cryptography plays a
major role in securing the personal information of the user. As such, many authentication …
major role in securing the personal information of the user. As such, many authentication …
An Enhanced Anti-phishing Scheme to Detect Phishing Website
Phishing is a network attack in which attacker generates a replica of current legitimate site to
contrivance the users into submitting their personal and sensitive information. A good anti …
contrivance the users into submitting their personal and sensitive information. A good anti …
Rewarding Reviews with Tokens Using Smart Contracts
K Devendran, V Rajasekar, V Sharma… - … in Technology and …, 2023 - ieeexplore.ieee.org
Research shows that 68% of online purchases are influenced by the reviews of the products
that are being sold. Online retailers know the importance of online reviews and how those …
that are being sold. Online retailers know the importance of online reviews and how those …
A secured signcryption scheme for e-payment system using hyper elliptic curve
M Devarajan, N Sasikaladevi - Journal of Intelligent & Fuzzy …, 2020 - content.iospress.com
With the growing trend of Communication Technologies (ICT), buying goods through online
has been increased drastically. Besides, e-payment makes online purchase easier and …
has been increased drastically. Besides, e-payment makes online purchase easier and …
A high-performance authentication-encryption scheme
KT Nguyen, MT Ta, HD Luu - … of Science and Technique-Section on …, 2022 - jst.lqdtu.edu.vn
This paper proposes an encryption scheme that enables verifying the source and integrity of
the encrypted message. Additionally, the proposed scheme generates a secret key which is …
the encrypted message. Additionally, the proposed scheme generates a secret key which is …
[引用][C] Healthcare cyberspace: medical cyber physical system in digital twin
V Rajasekar, K Sathya - Digital Twin Technologies for Healthcare 4.0, 2023 - IET