Results 81 to 90 of about 35,630 (203)
A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme
Smart card-based remote authentication schemes are widely used in multi-medical-server-based telecare medicine information systems (TMISs). Biometric is one of the most trustworthy authenticators and is presently being advocated to use in the remote ...
Subhas Barman +3 more
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Background: Electroencephalogram (EEG) signals of a brain contain a unique pattern for each person and the potential for biometric applications. Authentication and security is a very important issue in our life and brainwave-based authentication is an ...
Mahsa Zeynali, Hadi Seyedarabi
doaj +1 more source
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph +4 more
core +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
This study focuses on the methods of biometric authentication and identification of network administrators by voice. The authors propose a method for presenting unique voice parameters, as well as the principle of constructing an artificial neural ...
Irina V. Mashkina, Yelena P. Belova
doaj +1 more source
Usability and Trust in Information Systems [PDF]
The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage.
Sasse, MA
core
Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source
Ensuring secure and reliable identity verification is crucial, and biometric authentication plays a significant role in achieving this. However, relying on a single biometric trait, unimodal authentication, may have accuracy and attack vulnerability ...
Leila Kerkeni, Théo Gueuret
doaj +1 more source
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things
Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks.
Wencheng Yang +7 more
doaj +1 more source

