[HTML][HTML] Sensor-Based Authentication in Smartphone; a Systematic Review

ML Shuwandy, AS Jouda, MA Ahmed, MM Salih… - Journal of Engineering …, 2024 - Elsevier
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …

Continuous User Authentication on Multiple Smart Devices

Y Wang, X Zhang, H Hu - Information, 2023 - mdpi.com
Recent developments in the mobile and intelligence industry have led to an explosion in the
use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve …

[HTML][HTML] CGAPP: A continuous group authentication privacy-preserving platform for industrial scene

JME López, AH Celdrán, F Esquembre… - Journal of Information …, 2023 - Elsevier
Abstract In Industry 4.0, security begins with the workers' authentication, which can be done
individually or in groups. Recently, group authentication is gaining momentum, allowing …

SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method)

UW Abboud, ML Shuwandy - 2023 IEEE 13th International …, 2023 - ieeexplore.ieee.org
There are many encryption algorithms; some of them are strong but slow in decryption,
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …

LightRing-MO: Light Sensor Static-Authentication Using a Semi-Biometric Interacting with a LightRing

OA Shareef, ML Shuwandy - 2023 IEEE 14th Control and …, 2023 - ieeexplore.ieee.org
At this time, the smartphone is one of the most popular and commonly utilized instruments
for protecting private information. One of the smartphone authentication methods is …

Development MOLAZ Method in Multi Blocks: D3MB

UW Abboud, ML Shuwandy - 2023 IEEE 11th Conference on …, 2023 - ieeexplore.ieee.org
Data security and confidentiality are of utmost importance since sensitive information is
continually being sent through networks and kept on devices. Against illegal access and …

An Evaluation of Authentication Technologies for Web-Based Wireless Network security

A Deshpande, M Mishra, T Joshi… - … on Power Energy …, 2023 - ieeexplore.ieee.org
Technical details about the assessment of Authentication technology for internet-based
totally wireless community protection thesis the thesis on “An evaluation of Authentication …