Suchergebnisse - Distributed face authentication
-
1
MPCAuth: Multi-factor Authentication for Distributed-trust Systems
ISSN: 2375-1207Veröffentlicht: IEEE 01.05.2023Veröffentlicht in Proceedings - IEEE Symposium on Security and Privacy (01.05.2023)“… ). Authentication for these distributed-trust systems faces two challenges. The first challenge is ease-of-use …”
Volltext
Tagungsbericht -
2
Immersive online biometric authentication algorithm for online guiding based on face recognition and cloud-based mobile edge computing
ISSN: 0926-8782, 1573-7578Veröffentlicht: New York Springer US 01.06.2023Veröffentlicht in Distributed and parallel databases : an international journal (01.06.2023)“… The Internet deconstructs and reshapes the traditional classroom organization, the status of teachers, the authority of teaching materials and the role of …”
Volltext
Journal Article -
3
Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI AG 23.05.2022Veröffentlicht in Sensors (Basel, Switzerland) (23.05.2022)“… Fog computing offers solutions to those limitations; nevertheless, owning to its intrinsic distributed architecture, it faces challenges in the form of security of fog devices, secure authentication and privacy …”
Volltext
Journal Article -
4
Authentication Framework With Enhanced Privacy and Batch Verifiable Message Sharing in VANETs
ISSN: 0018-9545, 1939-9359, 1939-9359Veröffentlicht: New York IEEE 2025Veröffentlicht in IEEE transactions on vehicular technology (2025)“… Vehicular Ad Hoc Networks (VANETs) are the backbone of intelligent transport and enhanced passenger safety, but they face significant challenges related to authentication, security, and privacy …”
Volltext
Journal Article -
5
A Three-Party Batch Authentication Based on Twisted Edwards Curve in Mobile Edge Computing
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 15.11.2025Veröffentlicht in IEEE internet of things journal (15.11.2025)“… However, the existing authentication mechanism faces multiple challenges: the Denial-of-Service (DoS …”
Volltext
Journal Article -
6
Privacy-Preserving Continuous User Authentication Using Federated Learning
ISSN: 2376-6506Veröffentlicht: IEEE 12.05.2025Veröffentlicht in International Wireless Communications and Mobile Computing Conference (Online) (12.05.2025)“… Despite its promise, FL faces unique challenges in continuous user authentication, particularly due to the non-IID …”
Volltext
Tagungsbericht -
7
Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition
ISSN: 2078-2489, 2078-2489Veröffentlicht: Basel MDPI AG 01.11.2022Veröffentlicht in Information (Basel) (01.11.2022)“… it become a hot spot of market application. Users of a consortium system may register and log in different target domains to get the access authentications, so how to access resources in different domains efficiently to avoid the trust-island …”
Volltext
Journal Article -
8
Distributed Aggregate Privacy-Preserving Authentication in VANETs
ISSN: 1524-9050, 1558-0016Veröffentlicht: IEEE 01.03.2017Veröffentlicht in IEEE transactions on intelligent transportation systems (01.03.2017)“… Existing secure and privacy-preserving vehicular communication protocols in vehicular ad hoc networks face the challenges of being fast and not depending on ideal tamper-proof devices (TPDs …”
Volltext
Journal Article -
9
A Threshold Multi-CA Authentication Model for Privacy-Preserving Federated Semi-Supervised Learning in Healthcare IoT
ISSN: 0098-3063, 1558-4127Veröffentlicht: New York IEEE 01.08.2025Veröffentlicht in IEEE transactions on consumer electronics (01.08.2025)“… While existing FSSL frameworks offer collaborative learning capabilities, the reliance on centralized authentication architectures may face challenges in balancing security and operational efficiency …”
Volltext
Journal Article -
10
A Distributed Authentication Scheme Based on Zero-knowledge Proof
Veröffentlicht: IEEE 15.01.2021Veröffentlicht in 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE) (15.01.2021)“… As an underlying technology and infrastructure, blockchain creates great value when combining with other emerging information technologies, such as Artificial …”
Volltext
Tagungsbericht -
11
Facial authentication-based smart door lock system and anomaly detection using machine learning architectures integrated with IoT
ISSN: 0252-2667, 2169-0103Veröffentlicht: 01.09.2025Veröffentlicht in Journal of information & optimization sciences (01.09.2025)“… An SDL system that relies on face authentication and intrusion detection is the goal of this project, which intends to use …”
Volltext
Journal Article -
12
Multimodal Personal Ear Authentication Using Acoustic Ear Feature for Smartphone Security
ISSN: 0098-3063, 1558-4127Veröffentlicht: New York IEEE 01.02.2022Veröffentlicht in IEEE transactions on consumer electronics (01.02.2022)“… In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition …”
Volltext
Journal Article -
13
Low latency and secure data encryption for multi-hop biometric authentication in distributed networks
ISSN: 2542-6605, 2542-6605Veröffentlicht: Elsevier B.V 01.03.2025Veröffentlicht in Internet of things (Amsterdam. Online) (01.03.2025)“… Because of the rapid development of artificial intelligence and big data technology, biometric information has become widely used in applications across industries, such as biometric authentication and telemedicine …”
Volltext
Journal Article -
14
A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI AG 22.01.2023Veröffentlicht in Sensors (Basel, Switzerland) (22.01.2023)“… Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments …”
Volltext
Journal Article -
15
A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2019Veröffentlicht in IEEE access (2019)“… The face recognition has become a common means of identity authentication because of the advantages of uniqueness, non-invasive and not easy to be stolen …”
Volltext
Journal Article -
16
Optimization of Service Performance for Green Electricity Trading Platform Based on Distributed Authentication
Veröffentlicht: IEEE 28.11.2024Veröffentlicht in 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM) (28.11.2024)“… But with the explosive growth of transaction data, centralized authentication models face service capacity bottlenecks …”
Volltext
Tagungsbericht -
17
Robust authentication using the unconstrained infrared face images
ISSN: 0957-4174, 1873-6793Veröffentlicht: Amsterdam Elsevier Ltd 15.10.2014Veröffentlicht in Expert systems with applications (15.10.2014)“… •Two classifies are developed for robust authentication.•Promising results are achieved on both the constrained and the unconstrained IR Face database …”
Volltext
Journal Article -
18
A distributed identity management and cross-domain authentication scheme for the Internet of Things
ISSN: 0167-739XVeröffentlicht: Elsevier B.V 01.08.2025Veröffentlicht in Future generation computer systems (01.08.2025)“… ) management and authentication schemes. However, the widespread adoption of SSI still faces some challenges, such as key loss and the inefficiency of MerkleTree verification …”
Volltext
Journal Article -
19
Robust ear based authentication using Local Principal Independent Components
ISSN: 0957-4174, 1873-6793Veröffentlicht: Amsterdam Elsevier Ltd 15.11.2013Veröffentlicht in Expert systems with applications (15.11.2013)“… •Experiments carried out on the ear based authentication under both constrained and unconstrained environments are very promising …”
Volltext
Journal Article -
20
Single password authentication
ISSN: 1389-1286, 1872-7069Veröffentlicht: Kidlington Elsevier B.V 09.09.2013Veröffentlicht in Computer networks (Amsterdam, Netherlands : 1999) (09.09.2013)“… Users frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks, …”
Volltext
Journal Article