[HTML][HTML] From Iris Image to Embedded Code: System of Methods

I Matveev, I Safonov - Algorithms, 2023 - mdpi.com
Passwords are ubiquitous in today's world, as are forgetting and stealing them. Biometric
signs are harder to steal and impossible to forget. This paper presents a complete system of …

Personal Authentication System Based Iris Recognition with Digital Signature Technology

HM Therar, AJ Ali - Journal of Soft Computing and Data …, 2023 - publisher.uthm.edu.my
Authentication based on biometrics is being used to prevent physical access to high-security
institutions. Recently, due to the rapid rise of information system technologies, Biometrics …

Personal authentication system based on iris recognition and digital signature technology

HM Therar, AJ Ali - Journal of Soft Computing and Data …, 2022 - publisher.uthm.edu.my
Authentication based on biometrics is being used to prevent physical access to high-security
institutions. Recently, due to the rapid rise of information system technologies, biometrics is …

Secure Digital Signature Validated by Ambient User's Wi-Fi-enabled devices

AAS AlQahtani, H Alamleh… - 2021 IEEE 5th …, 2021 - ieeexplore.ieee.org
In cyberspace, a digital signature is a mathematical technique that plays a significant role,
especially in validating the authenticity of digital messages, emails, or documents …

Method and system for generating keys associated with biological extraction cluster categories

K Neumann - US Patent 11,588,630, 2023 - Google Patents
H04L9/0866—Generation of secret information including derivation or calculation of
cryptographic keys or passwords involving user or device identifiers, eg serial number …