Results 81 to 90 of about 35,630 (203)

A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme

open access: yesIEEE Access, 2019
Smart card-based remote authentication schemes are widely used in multi-medical-server-based telecare medicine information systems (TMISs). Biometric is one of the most trustworthy authenticators and is presently being advocated to use in the remote ...
Subhas Barman   +3 more
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

EEG-based single-channel authentication systems with optimum electrode placement for different mental activities

open access: yesBiomedical Journal, 2019
Background: Electroencephalogram (EEG) signals of a brain contain a unique pattern for each person and the potential for biometric applications. Authentication and security is a very important issue in our life and brainwave-based authentication is an ...
Mahsa Zeynali, Hadi Seyedarabi
doaj   +1 more source

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

open access: yes, 2018
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph   +4 more
core   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Development of neural network database for biometric images based on several parameters of voice sound spectrum for authentication and authorization by voice

open access: yesБезопасность информационных технологий, 2019
This study focuses on the methods of biometric authentication and identification of network administrators by voice. The authors propose a method for presenting unique voice parameters, as well as the principle of constructing an artificial neural ...
Irina V. Mashkina, Yelena P. Belova
doaj   +1 more source

Usability and Trust in Information Systems [PDF]

open access: yes, 2005
The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage.
Sasse, MA
core  

Digital Identity Wallets: A Guide to the EU’s New Identity Model

open access: yesInformation Systems Journal, Volume 36, Issue 3, Page 340-349, May 2026.
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra   +5 more
wiley   +1 more source

A Multimodal Biometric Authentication System Using of Autoencoders and Siamese Networks for Enhanced Security

open access: yesELCVIA Electronic Letters on Computer Vision and Image Analysis
Ensuring secure and reliable identity verification is crucial, and biometric authentication plays a significant role in achieving this. However, relying on a single biometric trait, unimodal authentication, may have accuracy and attack vulnerability ...
Leila Kerkeni, Théo Gueuret
doaj   +1 more source

A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things

open access: yesSensors, 2019
Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks.
Wencheng Yang   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy