Výsledky vyhledávání - Distributed face authentication
-
1
MPCAuth: Multi-factor Authentication for Distributed-trust Systems
ISSN: 2375-1207Vydáno: IEEE 01.05.2023Vydáno v Proceedings - IEEE Symposium on Security and Privacy (01.05.2023)“…). Authentication for these distributed-trust systems faces two challenges. The first challenge is ease-of-use…”
Získat plný text
Konferenční příspěvek -
2
Immersive online biometric authentication algorithm for online guiding based on face recognition and cloud-based mobile edge computing
ISSN: 0926-8782, 1573-7578Vydáno: New York Springer US 01.06.2023Vydáno v Distributed and parallel databases : an international journal (01.06.2023)“…The Internet deconstructs and reshapes the traditional classroom organization, the status of teachers, the authority of teaching materials and the role of…”
Získat plný text
Journal Article -
3
Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain
ISSN: 1424-8220, 1424-8220Vydáno: Switzerland MDPI AG 23.05.2022Vydáno v Sensors (Basel, Switzerland) (23.05.2022)“… Fog computing offers solutions to those limitations; nevertheless, owning to its intrinsic distributed architecture, it faces challenges in the form of security of fog devices, secure authentication and privacy…”
Získat plný text
Journal Article -
4
Authentication Framework With Enhanced Privacy and Batch Verifiable Message Sharing in VANETs
ISSN: 0018-9545, 1939-9359, 1939-9359Vydáno: New York IEEE 2025Vydáno v IEEE transactions on vehicular technology (2025)“…Vehicular Ad Hoc Networks (VANETs) are the backbone of intelligent transport and enhanced passenger safety, but they face significant challenges related to authentication, security, and privacy…”
Získat plný text
Journal Article -
5
A Three-Party Batch Authentication Based on Twisted Edwards Curve in Mobile Edge Computing
ISSN: 2327-4662, 2327-4662Vydáno: Piscataway IEEE 15.11.2025Vydáno v IEEE internet of things journal (15.11.2025)“… However, the existing authentication mechanism faces multiple challenges: the Denial-of-Service (DoS…”
Získat plný text
Journal Article -
6
Privacy-Preserving Continuous User Authentication Using Federated Learning
ISSN: 2376-6506Vydáno: IEEE 12.05.2025Vydáno v International Wireless Communications and Mobile Computing Conference (Online) (12.05.2025)“… Despite its promise, FL faces unique challenges in continuous user authentication, particularly due to the non-IID…”
Získat plný text
Konferenční příspěvek -
7
Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition
ISSN: 2078-2489, 2078-2489Vydáno: Basel MDPI AG 01.11.2022Vydáno v Information (Basel) (01.11.2022)“… it become a hot spot of market application. Users of a consortium system may register and log in different target domains to get the access authentications, so how to access resources in different domains efficiently to avoid the trust-island…”
Získat plný text
Journal Article -
8
Distributed Aggregate Privacy-Preserving Authentication in VANETs
ISSN: 1524-9050, 1558-0016Vydáno: IEEE 01.03.2017Vydáno v IEEE transactions on intelligent transportation systems (01.03.2017)“…Existing secure and privacy-preserving vehicular communication protocols in vehicular ad hoc networks face the challenges of being fast and not depending on ideal tamper-proof devices (TPDs…”
Získat plný text
Journal Article -
9
A Threshold Multi-CA Authentication Model for Privacy-Preserving Federated Semi-Supervised Learning in Healthcare IoT
ISSN: 0098-3063, 1558-4127Vydáno: New York IEEE 01.08.2025Vydáno v IEEE transactions on consumer electronics (01.08.2025)“… While existing FSSL frameworks offer collaborative learning capabilities, the reliance on centralized authentication architectures may face challenges in balancing security and operational efficiency…”
Získat plný text
Journal Article -
10
A Distributed Authentication Scheme Based on Zero-knowledge Proof
Vydáno: IEEE 15.01.2021Vydáno v 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE) (15.01.2021)“…As an underlying technology and infrastructure, blockchain creates great value when combining with other emerging information technologies, such as Artificial…”
Získat plný text
Konferenční příspěvek -
11
Facial authentication-based smart door lock system and anomaly detection using machine learning architectures integrated with IoT
ISSN: 0252-2667, 2169-0103Vydáno: 01.09.2025Vydáno v Journal of information & optimization sciences (01.09.2025)“… An SDL system that relies on face authentication and intrusion detection is the goal of this project, which intends to use…”
Získat plný text
Journal Article -
12
Multimodal Personal Ear Authentication Using Acoustic Ear Feature for Smartphone Security
ISSN: 0098-3063, 1558-4127Vydáno: New York IEEE 01.02.2022Vydáno v IEEE transactions on consumer electronics (01.02.2022)“…In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition…”
Získat plný text
Journal Article -
13
Low latency and secure data encryption for multi-hop biometric authentication in distributed networks
ISSN: 2542-6605, 2542-6605Vydáno: Elsevier B.V 01.03.2025Vydáno v Internet of things (Amsterdam. Online) (01.03.2025)“…Because of the rapid development of artificial intelligence and big data technology, biometric information has become widely used in applications across industries, such as biometric authentication and telemedicine…”
Získat plný text
Journal Article -
14
A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services
ISSN: 1424-8220, 1424-8220Vydáno: Switzerland MDPI AG 22.01.2023Vydáno v Sensors (Basel, Switzerland) (22.01.2023)“…Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments…”
Získat plný text
Journal Article -
15
A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2019Vydáno v IEEE access (2019)“…The face recognition has become a common means of identity authentication because of the advantages of uniqueness, non-invasive and not easy to be stolen…”
Získat plný text
Journal Article -
16
Optimization of Service Performance for Green Electricity Trading Platform Based on Distributed Authentication
Vydáno: IEEE 28.11.2024Vydáno v 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM) (28.11.2024)“… But with the explosive growth of transaction data, centralized authentication models face service capacity bottlenecks…”
Získat plný text
Konferenční příspěvek -
17
Robust authentication using the unconstrained infrared face images
ISSN: 0957-4174, 1873-6793Vydáno: Amsterdam Elsevier Ltd 15.10.2014Vydáno v Expert systems with applications (15.10.2014)“…•Two classifies are developed for robust authentication.•Promising results are achieved on both the constrained and the unconstrained IR Face database…”
Získat plný text
Journal Article -
18
A distributed identity management and cross-domain authentication scheme for the Internet of Things
ISSN: 0167-739XVydáno: Elsevier B.V 01.08.2025Vydáno v Future generation computer systems (01.08.2025)“…) management and authentication schemes. However, the widespread adoption of SSI still faces some challenges, such as key loss and the inefficiency of MerkleTree verification…”
Získat plný text
Journal Article -
19
Robust ear based authentication using Local Principal Independent Components
ISSN: 0957-4174, 1873-6793Vydáno: Amsterdam Elsevier Ltd 15.11.2013Vydáno v Expert systems with applications (15.11.2013)“…•Experiments carried out on the ear based authentication under both constrained and unconstrained environments are very promising…”
Získat plný text
Journal Article -
20
Single password authentication
ISSN: 1389-1286, 1872-7069Vydáno: Kidlington Elsevier B.V 09.09.2013Vydáno v Computer networks (Amsterdam, Netherlands : 1999) (09.09.2013)“…Users frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks,…”
Získat plný text
Journal Article