Search
Now showing items 1-5 of 5
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD ...
Authenticity detection as a binary text categorization problem: Application to Hadith authentication
(
IEEE Computer Society
, 2016 , Conference Paper)
Authentication of Hadiths (sayings of Prophet Muhammad) is very important field for religious scholars as well as historians. Authenticity verification is traditionally conducted by studying how trustworthy is each person ...
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ...
Automatic and Secure Electronic Gate System Using Fusion of License Plate, Car Make Recognition and Face Detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this paper, we propose an automatic electronic gate system with authenticity confirmation from 3 individual modules, viz., car make and model, license plate and face detection. The ultrasonic sensor detects the stopped ...
A multi-modal face and signature biometric authentication system using a max-of-scores based fusion
(
Springer
, 2012 , Conference Paper)
Face and signature based multimodal biometric systems are often required in various areas, such as banking biometric systems and secured mobile phone operating systems, among others. Our system combines these two biometric ...