Suchergebnisse - Distributed face authentication

  1. 1

    MPCAuth: Multi-factor Authentication for Distributed-trust Systems von Tan, Sijun, Chen, Weikeng, Deng, Ryan, Popa, Raluca Ada

    ISSN: 2375-1207
    Veröffentlicht: IEEE 01.05.2023
    “… ). Authentication for these distributed-trust systems faces two challenges. The first challenge is ease-of-use …”
    Volltext
    Tagungsbericht
  2. 2

    Immersive online biometric authentication algorithm for online guiding based on face recognition and cloud-based mobile edge computing von Su, Peng

    ISSN: 0926-8782, 1573-7578
    Veröffentlicht: New York Springer US 01.06.2023
    “… The Internet deconstructs and reshapes the traditional classroom organization, the status of teachers, the authority of teaching materials and the role of …”
    Volltext
    Journal Article
  3. 3

    Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain von Umoren, Otuekong, Singh, Raman, Pervez, Zeeshan, Dahal, Keshav

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI AG 23.05.2022
    Veröffentlicht in Sensors (Basel, Switzerland) (23.05.2022)
    “… Fog computing offers solutions to those limitations; nevertheless, owning to its intrinsic distributed architecture, it faces challenges in the form of security of fog devices, secure authentication and privacy …”
    Volltext
    Journal Article
  4. 4

    Authentication Framework With Enhanced Privacy and Batch Verifiable Message Sharing in VANETs von Naskar, Sujash, Brunetta, Carlo, Zhang, Tingting, Hancke, Gerhard, Gidlund, Mikael

    ISSN: 0018-9545, 1939-9359, 1939-9359
    Veröffentlicht: New York IEEE 2025
    Veröffentlicht in IEEE transactions on vehicular technology (2025)
    “… Vehicular Ad Hoc Networks (VANETs) are the backbone of intelligent transport and enhanced passenger safety, but they face significant challenges related to authentication, security, and privacy …”
    Volltext
    Journal Article
  5. 5

    A Three-Party Batch Authentication Based on Twisted Edwards Curve in Mobile Edge Computing von Dong, Jiarui, Tian, Junfeng

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 15.11.2025
    Veröffentlicht in IEEE internet of things journal (15.11.2025)
    “… However, the existing authentication mechanism faces multiple challenges: the Denial-of-Service (DoS …”
    Volltext
    Journal Article
  6. 6

    Privacy-Preserving Continuous User Authentication Using Federated Learning von Bouldjedri, Oussama, Wazzeh, Mohamed, Sami, Hani, Talhi, Chamseddine, Ould-Slimane, Hakima

    ISSN: 2376-6506
    Veröffentlicht: IEEE 12.05.2025
    “… Despite its promise, FL faces unique challenges in continuous user authentication, particularly due to the non-IID …”
    Volltext
    Tagungsbericht
  7. 7

    Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition von Chen, Xiang, Xu, Shouzhi, Ma, Kai, Chen, Peng

    ISSN: 2078-2489, 2078-2489
    Veröffentlicht: Basel MDPI AG 01.11.2022
    Veröffentlicht in Information (Basel) (01.11.2022)
    “… it become a hot spot of market application. Users of a consortium system may register and log in different target domains to get the access authentications, so how to access resources in different domains efficiently to avoid the trust-island …”
    Volltext
    Journal Article
  8. 8

    Distributed Aggregate Privacy-Preserving Authentication in VANETs von Lei Zhang, Qianhong Wu, Domingo-Ferrer, Josep, Bo Qin, Chuanyan Hu

    ISSN: 1524-9050, 1558-0016
    Veröffentlicht: IEEE 01.03.2017
    “… Existing secure and privacy-preserving vehicular communication protocols in vehicular ad hoc networks face the challenges of being fast and not depending on ideal tamper-proof devices (TPDs …”
    Volltext
    Journal Article
  9. 9

    A Threshold Multi-CA Authentication Model for Privacy-Preserving Federated Semi-Supervised Learning in Healthcare IoT von Wang, Zhoukai, Xiang, Chen, Wei, Jiakai, Zhang, Dawei, Su, Shen, Liu, Lei

    ISSN: 0098-3063, 1558-4127
    Veröffentlicht: New York IEEE 01.08.2025
    Veröffentlicht in IEEE transactions on consumer electronics (01.08.2025)
    “… While existing FSSL frameworks offer collaborative learning capabilities, the reliance on centralized authentication architectures may face challenges in balancing security and operational efficiency …”
    Volltext
    Journal Article
  10. 10

    A Distributed Authentication Scheme Based on Zero-knowledge Proof von Qin, Lang, Ma, Feng, Xie, Hao Geng, Zhang, Sheng Li

    Veröffentlicht: IEEE 15.01.2021
    “… As an underlying technology and infrastructure, blockchain creates great value when combining with other emerging information technologies, such as Artificial …”
    Volltext
    Tagungsbericht
  11. 11

    Facial authentication-based smart door lock system and anomaly detection using machine learning architectures integrated with IoT von Derbali, Morched, Harbaoui, Ahmed, Jarrah, Mutasem, khoualdi, Kamel Taher

    ISSN: 0252-2667, 2169-0103
    Veröffentlicht: 01.09.2025
    Veröffentlicht in Journal of information & optimization sciences (01.09.2025)
    “… An SDL system that relies on face authentication and intrusion detection is the goal of this project, which intends to use …”
    Volltext
    Journal Article
  12. 12

    Multimodal Personal Ear Authentication Using Acoustic Ear Feature for Smartphone Security von Itani, Shunji, Kita, Shunsuke, Kajikawa, Yoshinobu

    ISSN: 0098-3063, 1558-4127
    Veröffentlicht: New York IEEE 01.02.2022
    Veröffentlicht in IEEE transactions on consumer electronics (01.02.2022)
    “… In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition …”
    Volltext
    Journal Article
  13. 13

    Low latency and secure data encryption for multi-hop biometric authentication in distributed networks von Lee, Sun-Jin, Lee, Jin-Min, Lee, Il-Gu

    ISSN: 2542-6605, 2542-6605
    Veröffentlicht: Elsevier B.V 01.03.2025
    Veröffentlicht in Internet of things (Amsterdam. Online) (01.03.2025)
    “… Because of the rapid development of artificial intelligence and big data technology, biometric information has become widely used in applications across industries, such as biometric authentication and telemedicine …”
    Volltext
    Journal Article
  14. 14

    A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services von Yu, Linsheng, He, Mingxing, Liang, Hongbin, Xiong, Ling, Liu, Yang

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI AG 22.01.2023
    Veröffentlicht in Sensors (Basel, Switzerland) (22.01.2023)
    “… Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments …”
    Volltext
    Journal Article
  15. 15

    A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication von Wang, Xiang, Xue, Heyu, Liu, Xuefeng, Pei, Qingqi

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2019
    Veröffentlicht in IEEE access (2019)
    “… The face recognition has become a common means of identity authentication because of the advantages of uniqueness, non-invasive and not easy to be stolen …”
    Volltext
    Journal Article
  16. 16

    Optimization of Service Performance for Green Electricity Trading Platform Based on Distributed Authentication von Liu, Jiajun, Lin, Xijun, Liu, Jiaxun, Zhong, Jiayu, Huang, Kangqian, Hu, Xin, Liu, Zhenzhen, Huang, Jingyin, Zheng, Yingkai

    Veröffentlicht: IEEE 28.11.2024
    “… But with the explosive growth of transaction data, centralized authentication models face service capacity bottlenecks …”
    Volltext
    Tagungsbericht
  17. 17

    Robust authentication using the unconstrained infrared face images von Mamta, Hanmandlu, Madasu

    ISSN: 0957-4174, 1873-6793
    Veröffentlicht: Amsterdam Elsevier Ltd 15.10.2014
    Veröffentlicht in Expert systems with applications (15.10.2014)
    “… •Two classifies are developed for robust authentication.•Promising results are achieved on both the constrained and the unconstrained IR Face database …”
    Volltext
    Journal Article
  18. 18

    A distributed identity management and cross-domain authentication scheme for the Internet of Things von Wang, Miaomiao, Wang, Ze

    ISSN: 0167-739X
    Veröffentlicht: Elsevier B.V 01.08.2025
    Veröffentlicht in Future generation computer systems (01.08.2025)
    “… ) management and authentication schemes. However, the widespread adoption of SSI still faces some challenges, such as key loss and the inefficiency of MerkleTree verification …”
    Volltext
    Journal Article
  19. 19

    Robust ear based authentication using Local Principal Independent Components von Mamta, Hanmandlu, Madasu

    ISSN: 0957-4174, 1873-6793
    Veröffentlicht: Amsterdam Elsevier Ltd 15.11.2013
    Veröffentlicht in Expert systems with applications (15.11.2013)
    “… •Experiments carried out on the ear based authentication under both constrained and unconstrained environments are very promising …”
    Volltext
    Journal Article
  20. 20

    Single password authentication von Acar, Tolga, Belenkiy, Mira, Küpçü, Alptekin

    ISSN: 1389-1286, 1872-7069
    Veröffentlicht: Kidlington Elsevier B.V 09.09.2013
    Veröffentlicht in Computer networks (Amsterdam, Netherlands : 1999) (09.09.2013)
    “… Users frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks, …”
    Volltext
    Journal Article