Implementation of AES using biometric
R Srividya, B Ramesh - International Journal of Electrical and …, 2019 - search.proquest.com
Mobile Adhoc network is the most advanced emerging technology in the field of wireless
communication. MANETs mainly have the capacity of self-forming, self-healing, enabling …
communication. MANETs mainly have the capacity of self-forming, self-healing, enabling …
Biometric template protection for dynamic touch gestures based on fuzzy commitment scheme and deep learning
A Bajaber, L Elrefaei - Mathematics, 2022 - mdpi.com
Privacy plays an important role in biometric authentication systems. Touch authentication
systems have been widely used since touch devices reached their current level of …
systems have been widely used since touch devices reached their current level of …
AES cardless automatic teller machine (ATM) biometric security system design using FPGA implementation
N Ahmad, AAM Rifen… - IOP conference series …, 2016 - iopscience.iop.org
Abstract Automated Teller Machine (ATM) is an electronic banking outlet that allows bank
customers to complete a banking transactions without the aid of any bank official or teller …
customers to complete a banking transactions without the aid of any bank official or teller …
State of the art in biometric key binding and key generation schemes
authentication system and legitimate users to numerous security and privacy challenges.
Biometric cryptosystems or template protection schemes are used to overcome the security …
Biometric cryptosystems or template protection schemes are used to overcome the security …
Cryptobiometrics for the generation of cancellable symmetric and asymmetric ciphers with perfect secrecy
V Jara-Vera, C Sánchez-Ávila - Mathematics, 2020 - mdpi.com
Security objectives are the triad of confidentiality, integrity, and authentication, which may be
extended with availability, utility, and control. In order to achieve these goals …
extended with availability, utility, and control. In order to achieve these goals …
[PDF][PDF] Hybrid ciphering method based on chaos logistic map and fingerprint information
In modern era, which requires the use of networks in the transmission of data across
distances, the transport or storage of such data is required to be safe. The protection …
distances, the transport or storage of such data is required to be safe. The protection …
Dynamic Key‐based Biometric End‐User Authentication Proposal for IoT in Industry 4.0
S Mondal, S Banerjee, S Halder… - Artificial Intelligence in …, 2022 - Wiley Online Library
Recent years have witnessed rapid research and growth in Internet of Things (IoT), both in
the prospects of architecture and the voluminous increase in inter‐networked devices. The …
the prospects of architecture and the voluminous increase in inter‐networked devices. The …
[PDF][PDF] Analisis Implementasi Enkripsi Biometrik-AES pada Environment Variable dalam Pengembangan Perangkat Lunak
T Subekti - informatika.stei.itb.ac.id
Dalam pengembangan perangkat lunak modern, variabel lingkungan digunakan untuk
menyimpan informasi sensitif seperti kunci API, kredensial basis data, dan data konfigurasi …
menyimpan informasi sensitif seperti kunci API, kredensial basis data, dan data konfigurasi …
[PDF][PDF] 128-Bit Secured Hybrid Key for Cryptographic Algorithms
SS SathyaPriya - publications.scrs.in
In this paper a high degree of accuracy coupled with enhanced security 128 bit hybrid
cryptographic key is generated. This key is generated by considering more than one bio …
cryptographic key is generated. This key is generated by considering more than one bio …
[PDF][PDF] Biometric Voting System to Eradicate Illegal Voting
P Divyabharathi, CA Murugan, A Nivedita - 2020 - researchgate.net
The main objective of this work is to implement the Aadhar card for voting and also
eliminating separate cards for a single person for any type of work. The manual operation …
eliminating separate cards for a single person for any type of work. The manual operation …