The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

BRAKE: Biometric Resilient Authenticated Key Exchange

P Bauspieß, T Silde, M Poljuha, A Tullot… - IEEE …, 2024 - ieeexplore.ieee.org
Biometric data are uniquely suited for connecting individuals to their digital identities.
Deriving cryptographic key exchange from successful biometric authentication therefore …

[PDF][PDF] Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health.

AS Anakath, S Ambika, S Rajakumar… - … Systems Science & …, 2022 - cdn.techscience.cn
Cloud computing becomes an important application development platform for processing
user data with high security. Service providers are accustomed to providing storage centers …

[PDF][PDF] Secure multimodal authentication scheme for wireless sensor networks

P Shivanna, SS Venkatesiah - International Journal of Safety …, 2021 - scholar.archive.org
Received: 26 Spetember 2021 Accepted: 2 December 2021 In the current era, it is
necessary to device authorization and authentication techniques to secure resources in …

[PDF][PDF] Improved Key Agreement Based Kerberos Protocol for M-Health Security.

P Thirumoorthy, KS Bhuvaneshwari… - … Systems Science & …, 2022 - researchgate.net
(IoT) predicts various applications in the field of healthcare and cloud computing. This can
give promising results on mobile health care (M-health) and Telecare medicine information …

Biometric authentication utilizing fuzzy extractor with PSO based security ensuring the data security mechanism as Trio in Cloud

A Sathish, A Bajulunisha, R Sridevi… - Journal of Intelligent & …, 2022 - content.iospress.com
Cloud computing is widely preferred by various organizations due to its numerous
advantages such as lower costs, better security, and faster processing times. The most …

BRAKE: Biometric Resilient Authenticated Key Exchange

TA Silde, P Bauspieß, A Costache, M Poljuha, A Tullot… - 2024 - ntnuopen.ntnu.no
Biometric data are uniquely suited for connecting individuals to their digital identities.
Deriving cryptographic key exchange from successful biometric authentication therefore …

Post-Quantum Secure Biometric Systems

PV Bauspieß - 2024 - ntnuopen.ntnu.no
Biometrics, which is defined as the automated recognition of individuals based on their
behavioural and biological characteristics, can be applied to increase the trust and usability …

Securing Biometric Data with Optimized Share Creation and Visual Cryptography Technique

L Shammi, CE Shyni, KU Nisa, RK Bora… - 2022 6th …, 2022 - ieeexplore.ieee.org
Biometric security is the fastest growing area that receives considerable attention over the
past few years. Digital hiding and encryption technologies provide an effective solution to …

Jedna klasa sistema za generisanje I distribuciju kriptoloških ključeva zasnovana na više biometrijskih modaliteta

J Gavrilović - Универзитет Сингидунум, 2022 - nardus.mpn.gov.rs
U doktorskoj disertaciji predložena je jedna klasa sistema za generisanje i distribuciju
kriptoloških ključeva na osnovu više biometrijskih modaliteta. Teorijskim okvirom …