The Emerging Challenges of Wearable Biometric Cryptosystems
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …
technologies is an emerging research area with significant potential for authentication and …
BRAKE: Biometric Resilient Authenticated Key Exchange
P Bauspieß, T Silde, M Poljuha, A Tullot… - IEEE …, 2024 - ieeexplore.ieee.org
Biometric data are uniquely suited for connecting individuals to their digital identities.
Deriving cryptographic key exchange from successful biometric authentication therefore …
Deriving cryptographic key exchange from successful biometric authentication therefore …
[PDF][PDF] Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health.
Cloud computing becomes an important application development platform for processing
user data with high security. Service providers are accustomed to providing storage centers …
user data with high security. Service providers are accustomed to providing storage centers …
[PDF][PDF] Secure multimodal authentication scheme for wireless sensor networks
P Shivanna, SS Venkatesiah - International Journal of Safety …, 2021 - scholar.archive.org
Received: 26 Spetember 2021 Accepted: 2 December 2021 In the current era, it is
necessary to device authorization and authentication techniques to secure resources in …
necessary to device authorization and authentication techniques to secure resources in …
[PDF][PDF] Improved Key Agreement Based Kerberos Protocol for M-Health Security.
P Thirumoorthy, KS Bhuvaneshwari… - … Systems Science & …, 2022 - researchgate.net
(IoT) predicts various applications in the field of healthcare and cloud computing. This can
give promising results on mobile health care (M-health) and Telecare medicine information …
give promising results on mobile health care (M-health) and Telecare medicine information …
Biometric authentication utilizing fuzzy extractor with PSO based security ensuring the data security mechanism as Trio in Cloud
A Sathish, A Bajulunisha, R Sridevi… - Journal of Intelligent & …, 2022 - content.iospress.com
Cloud computing is widely preferred by various organizations due to its numerous
advantages such as lower costs, better security, and faster processing times. The most …
advantages such as lower costs, better security, and faster processing times. The most …
BRAKE: Biometric Resilient Authenticated Key Exchange
Biometric data are uniquely suited for connecting individuals to their digital identities.
Deriving cryptographic key exchange from successful biometric authentication therefore …
Deriving cryptographic key exchange from successful biometric authentication therefore …
Post-Quantum Secure Biometric Systems
PV Bauspieß - 2024 - ntnuopen.ntnu.no
Biometrics, which is defined as the automated recognition of individuals based on their
behavioural and biological characteristics, can be applied to increase the trust and usability …
behavioural and biological characteristics, can be applied to increase the trust and usability …
Securing Biometric Data with Optimized Share Creation and Visual Cryptography Technique
L Shammi, CE Shyni, KU Nisa, RK Bora… - 2022 6th …, 2022 - ieeexplore.ieee.org
Biometric security is the fastest growing area that receives considerable attention over the
past few years. Digital hiding and encryption technologies provide an effective solution to …
past few years. Digital hiding and encryption technologies provide an effective solution to …
Jedna klasa sistema za generisanje I distribuciju kriptoloških ključeva zasnovana na više biometrijskih modaliteta
J Gavrilović - Универзитет Сингидунум, 2022 - nardus.mpn.gov.rs
U doktorskoj disertaciji predložena je jedna klasa sistema za generisanje i distribuciju
kriptoloških ključeva na osnovu više biometrijskih modaliteta. Teorijskim okvirom …
kriptoloških ključeva na osnovu više biometrijskih modaliteta. Teorijskim okvirom …