[HTML][HTML] Sensor-Based Authentication in Smartphone; a Systematic Review
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …
and messaging only, but they are using it for a variety of purposes such as banking …
Continuous User Authentication on Multiple Smart Devices
Y Wang, X Zhang, H Hu - Information, 2023 - mdpi.com
Recent developments in the mobile and intelligence industry have led to an explosion in the
use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve …
use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve …
[HTML][HTML] CGAPP: A continuous group authentication privacy-preserving platform for industrial scene
Abstract In Industry 4.0, security begins with the workers' authentication, which can be done
individually or in groups. Recently, group authentication is gaining momentum, allowing …
individually or in groups. Recently, group authentication is gaining momentum, allowing …
SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method)
UW Abboud, ML Shuwandy - 2023 IEEE 13th International …, 2023 - ieeexplore.ieee.org
There are many encryption algorithms; some of them are strong but slow in decryption,
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …
LightRing-MO: Light Sensor Static-Authentication Using a Semi-Biometric Interacting with a LightRing
OA Shareef, ML Shuwandy - 2023 IEEE 14th Control and …, 2023 - ieeexplore.ieee.org
At this time, the smartphone is one of the most popular and commonly utilized instruments
for protecting private information. One of the smartphone authentication methods is …
for protecting private information. One of the smartphone authentication methods is …
Development MOLAZ Method in Multi Blocks: D3MB
UW Abboud, ML Shuwandy - 2023 IEEE 11th Conference on …, 2023 - ieeexplore.ieee.org
Data security and confidentiality are of utmost importance since sensitive information is
continually being sent through networks and kept on devices. Against illegal access and …
continually being sent through networks and kept on devices. Against illegal access and …
An Evaluation of Authentication Technologies for Web-Based Wireless Network security
A Deshpande, M Mishra, T Joshi… - … on Power Energy …, 2023 - ieeexplore.ieee.org
Technical details about the assessment of Authentication technology for internet-based
totally wireless community protection thesis the thesis on “An evaluation of Authentication …
totally wireless community protection thesis the thesis on “An evaluation of Authentication …