Browsing by Subject "Authentication"
Now showing items 1-20 of 20
-
A multi-modal face and signature biometric authentication system using a max-of-scores based fusion
( Springer , 2012 , Conference Paper)Face and signature based multimodal biometric systems are often required in various areas, such as banking biometric systems and secured mobile phone operating systems, among others. Our system combines these two biometric ... -
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ... -
Authenticity detection as a binary text categorization problem: Application to Hadith authentication
( IEEE Computer Society , 2016 , Conference Paper)Authentication of Hadiths (sayings of Prophet Muhammad) is very important field for religious scholars as well as historians. Authenticity verification is traditionally conducted by studying how trustworthy is each person ... -
Automatic and Secure Electronic Gate System Using Fusion of License Plate, Car Make Recognition and Face Detection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this paper, we propose an automatic electronic gate system with authenticity confirmation from 3 individual modules, viz., car make and model, license plate and face detection. The ultrasonic sensor detects the stopped ... -
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ... -
EDITH : ECG Biometrics Aided by Deep Learning for Reliable Individual Authentication
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In recent years, physiological signal-based authentication has shown great promises, for its inherent robustness against forgery. Electrocardiogram (ECG) signal, being the most widely studied biosignal, has also received ... -
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are still more dependent on smart systems. Considering that packets are exchanged between the end user and the ... -
GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment
( Elsevier , 2022 , Article)Industry Internet of Things (IIoT) has become the most evolving area over the last few years. The number of IoT devices connected in industry has sharply elevated but this surge has led to the vulnerability and data breach ... -
Handover authentication for mobile networks: Security and efficiency aspects
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ... -
Hierarchical security paradigm for iot multiaccess edge computing
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several ... -
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ... -
LAMANCO: A lightweight anonymous mutual authentication scheme for n -times computing offloading in IoT
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Nowadays in many application scenarios of Internet of Things (IoT), low latency is achieved at the cost of computing-complexity which is beyond the capabilities of IoT devices. Offloading the computing intensive tasks to ... -
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives
( Elsevier , 2022 , Article Review)With the widespread use of Internet of things (IoT), mobile phones, connected devices and artificial intelligence (AI), recommender systems (RSs) have become a booming technology because of their capability to analyze big ... -
Leveraging utilization as performance metric for CDN enabled energy efficient internet of things
( Elsevier B.V. , 2019 , Article)The exponential increase in the Internet of Things (IoT) has drastically augmented the need for computing and storage resources. IoT devices generate massive data that requires to be efficiently stored and disseminated for ... -
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Electric vehicles (EVs) have been slowly replacing conventional fuel based vehicles since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities ... -
Multi-layer security scheme for implantable medical devices
( Springer , 2020 , Article)Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ... -
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Electroencephalography (EEG) based biometric systems are gaining attention for their anti-spoofing capability but lack accuracy due to signal variability at different psychological and physiological conditions. On the other ... -
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
( Elsevier , 2023 , Article)The Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to information. IoT is the collection of many linked devices ... -
Robust biometric system using session invariant multimodal EEG and keystroke dynamics by the ensemble of self-ONNs
( Elsevier Ltd , 2022 , Article)Harnessing the inherent anti-spoofing quality from electroencephalogram (EEG) signals has become a potential field of research in recent years. Although several studies have been conducted, still there are some vital ... -
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD ...