The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
Continuous and transparent multimodal authentication: reviewing the state of the art
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …
online and via various Internet-enabled digital devices. Unfortunately, these activities …
[PDF][PDF] Best practices for ensuring security in Devops: A case study approach
DS Battina - International Journal of Innovations in Engineering …, 2017 - researchgate.net
The main purpose of this paper is to explore the best practices that can be adopted to
ensure security in DevOps. Among the paper's key topics are the definitions of both DevOps …
ensure security in DevOps. Among the paper's key topics are the definitions of both DevOps …
A high-security-level iris cryptosystem based on fuzzy commitment and soft reliability extraction
KC Lin, YM Chen - IEEE Transactions on Dependable and …, 2023 - ieeexplore.ieee.org
In this paper, an error-correction-based iris recognition (EC-IR) scheme that guarantees both
secure template storage and high-level recognition accuracy is first constructed for personal …
secure template storage and high-level recognition accuracy is first constructed for personal …
A survey on different continuous authentication systems
S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …
authentication, however, there is still need for continuous authentication during a user …
Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security
The authentication of the Wireless Body Area Networks (WBANs) nodes is a vital factor in its
medical applications. This paper, investigates methods of authentication over these …
medical applications. This paper, investigates methods of authentication over these …
You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks
The Internet-of-Things (IoT) is an evolutionary paradigm seamlessly integrating an
enormous number of smart objects within the Internet. Recently, with the rapid growth and …
enormous number of smart objects within the Internet. Recently, with the rapid growth and …
FIDOnuous: a FIDO2/WebAuthn extension to support continuous web authentication
E Klieme, J Wilke, N van Dornick… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
For many years username and password are the common solution to protect sensitive web
services despite its various drawbacks. While many alternatives were proposed to improve …
services despite its various drawbacks. While many alternatives were proposed to improve …
Gesture and sociability-based continuous authentication on smart mobile devices
In this paper, we propose a new continuous verification platform on smart mobile devices. To
this end, we integrate gesture-based features with interaction with social networking apps to …
this end, we integrate gesture-based features with interaction with social networking apps to …
Securing cloud storage by transparent biometric cryptography
With the capability of storing huge volumes of data over the Internet, cloud storage has
become a popular and desirable service for individuals and enterprises. The security issues …
become a popular and desirable service for individuals and enterprises. The security issues …