Loading…
Deep learning-based user authentication with hybrid encryption for secured blockchain-aided data storage and optimal task offloading in mobile edge computing
Ganesh, N. S. Gowri, Balasubramanian, V., Prasad, D. Venkata Vara, Velan, S. Senthil
Published in Wireless networks (01.03.2025)
Published in Wireless networks (01.03.2025)
Get full text
Journal Article
Loading…
An Efficient Blockchain-Powered Authentication Scheme for Secure Communication in IoMT
Chhikara, Deepak, Chauhan Gonder, Surjeet Singh, Rana, Saurabh
Published in IEEE internet of things journal (01.06.2025)
Published in IEEE internet of things journal (01.06.2025)
Get full text
Journal Article
Loading…
Secure Internet Banking Authentication
Suba, P., Mailsamy, M., Sinduja, S.
Published in International journal of engineering and advanced technology (06.09.2019)
Published in International journal of engineering and advanced technology (06.09.2019)
Get full text
Journal Article
Loading…
Loading…
Loading…
MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME
A. Abdulrahman, Safana, F. Al-Gailani, M.
Published in Iraqi Journal of Information & Communication Technology (30.12.2022)
Published in Iraqi Journal of Information & Communication Technology (30.12.2022)
Get full text
Journal Article
Loading…
Continuous User Authentication Using IoT Wearable Sensors
Smyth, Conor, Wang, Guoxin, Panicker, Rajesh, Nag, Avishek, Cardiff, Barry, John, Deepu
Published in IEEE International Symposium on Circuits and Systems proceedings (01.05.2021)
Published in IEEE International Symposium on Circuits and Systems proceedings (01.05.2021)
Get full text
Conference Proceeding
Loading…
S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information
Espín López, Juan Manuel, Huertas Celdrán, Alberto, Marín-Blázquez, Javier G., Esquembre, Francisco, Martínez Pérez, Gregorio
Published in Sensors (Basel, Switzerland) (28.05.2021)
Published in Sensors (Basel, Switzerland) (28.05.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment
Reshma, G., Prasanna, B. T., Murthy, H. S. Niranjana, Murthy, T. S. N., Parthiban, S., Sangeetha, M.
Published in Soft computing (Berlin, Germany) (28.04.2023)
Published in Soft computing (Berlin, Germany) (28.04.2023)
Get full text
Journal Article
Loading…
Electrocardiogram (ECG) Biometric Authentication Using Pulse Active Ratio (PAR)
Safie, S. I., Soraghan, J. J., Petropoulakis, L.
Published in IEEE transactions on information forensics and security (01.12.2011)
Published in IEEE transactions on information forensics and security (01.12.2011)
Get full text
Journal Article
Loading…
Loading…
Loading…
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns
Islam, Shekh M. M., Zheng, Yao, Pan, Yanjun, Millan, Marionne, Chang, Willy, Li, Ming, Boric-Lubecke, Olga, Lubecke, Victor, Sun, Wenhai
Published in IEEE internet of things journal (15.08.2023)
Published in IEEE internet of things journal (15.08.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
The need for a worldwide consensus for cell line authentication: Experience implementing a mandatory requirement at the International Journal of Cancer
Fusenig, Norbert E., Capes-Davis, Amanda, Bianchini, Franca, Sundell, Sherryl, Lichter, Peter
Published in PLoS biology (17.04.2017)
Published in PLoS biology (17.04.2017)
Get full text
Journal Article
Loading…
Loading…
DNA barcodes, ISSR, RAPD and SCAR markers as potential quality control tools for molecular authentication of black and white mulberry
El-Haggar, Miran A., Mahgoub, Yasmin A., Aly, Hesham M., Ghazy, Nabila M., El-Fiky, Fathy K., El-Hawiet, Amr M.
Published in Food control (01.10.2023)
Published in Food control (01.10.2023)
Get full text
Journal Article