Search Results - Distributed face authentication
-
1
MPCAuth: Multi-factor Authentication for Distributed-trust Systems
ISSN: 2375-1207Published: IEEE 01.05.2023Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2023)“…). Authentication for these distributed-trust systems faces two challenges. The first challenge is ease-of-use…”
Get full text
Conference Proceeding -
2
Immersive online biometric authentication algorithm for online guiding based on face recognition and cloud-based mobile edge computing
ISSN: 0926-8782, 1573-7578Published: New York Springer US 01.06.2023Published in Distributed and parallel databases : an international journal (01.06.2023)“…The Internet deconstructs and reshapes the traditional classroom organization, the status of teachers, the authority of teaching materials and the role of…”
Get full text
Journal Article -
3
Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI AG 23.05.2022Published in Sensors (Basel, Switzerland) (23.05.2022)“… Fog computing offers solutions to those limitations; nevertheless, owning to its intrinsic distributed architecture, it faces challenges in the form of security of fog devices, secure authentication and privacy…”
Get full text
Journal Article -
4
Authentication Framework With Enhanced Privacy and Batch Verifiable Message Sharing in VANETs
ISSN: 0018-9545, 1939-9359, 1939-9359Published: New York IEEE 2025Published in IEEE transactions on vehicular technology (2025)“…Vehicular Ad Hoc Networks (VANETs) are the backbone of intelligent transport and enhanced passenger safety, but they face significant challenges related to authentication, security, and privacy…”
Get full text
Journal Article -
5
A Three-Party Batch Authentication Based on Twisted Edwards Curve in Mobile Edge Computing
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 15.11.2025Published in IEEE internet of things journal (15.11.2025)“… However, the existing authentication mechanism faces multiple challenges: the Denial-of-Service (DoS…”
Get full text
Journal Article -
6
Privacy-Preserving Continuous User Authentication Using Federated Learning
ISSN: 2376-6506Published: IEEE 12.05.2025Published in International Wireless Communications and Mobile Computing Conference (Online) (12.05.2025)“… Despite its promise, FL faces unique challenges in continuous user authentication, particularly due to the non-IID…”
Get full text
Conference Proceeding -
7
Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition
ISSN: 2078-2489, 2078-2489Published: Basel MDPI AG 01.11.2022Published in Information (Basel) (01.11.2022)“… it become a hot spot of market application. Users of a consortium system may register and log in different target domains to get the access authentications, so how to access resources in different domains efficiently to avoid the trust-island…”
Get full text
Journal Article -
8
Distributed Aggregate Privacy-Preserving Authentication in VANETs
ISSN: 1524-9050, 1558-0016Published: IEEE 01.03.2017Published in IEEE transactions on intelligent transportation systems (01.03.2017)“…Existing secure and privacy-preserving vehicular communication protocols in vehicular ad hoc networks face the challenges of being fast and not depending on ideal tamper-proof devices (TPDs…”
Get full text
Journal Article -
9
A Threshold Multi-CA Authentication Model for Privacy-Preserving Federated Semi-Supervised Learning in Healthcare IoT
ISSN: 0098-3063, 1558-4127Published: New York IEEE 01.08.2025Published in IEEE transactions on consumer electronics (01.08.2025)“… While existing FSSL frameworks offer collaborative learning capabilities, the reliance on centralized authentication architectures may face challenges in balancing security and operational efficiency…”
Get full text
Journal Article -
10
A Distributed Authentication Scheme Based on Zero-knowledge Proof
Published: IEEE 15.01.2021Published in 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE) (15.01.2021)“…As an underlying technology and infrastructure, blockchain creates great value when combining with other emerging information technologies, such as Artificial…”
Get full text
Conference Proceeding -
11
Facial authentication-based smart door lock system and anomaly detection using machine learning architectures integrated with IoT
ISSN: 0252-2667, 2169-0103Published: 01.09.2025Published in Journal of information & optimization sciences (01.09.2025)“… An SDL system that relies on face authentication and intrusion detection is the goal of this project, which intends to use…”
Get full text
Journal Article -
12
Multimodal Personal Ear Authentication Using Acoustic Ear Feature for Smartphone Security
ISSN: 0098-3063, 1558-4127Published: New York IEEE 01.02.2022Published in IEEE transactions on consumer electronics (01.02.2022)“…In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition…”
Get full text
Journal Article -
13
Low latency and secure data encryption for multi-hop biometric authentication in distributed networks
ISSN: 2542-6605, 2542-6605Published: Elsevier B.V 01.03.2025Published in Internet of things (Amsterdam. Online) (01.03.2025)“…Because of the rapid development of artificial intelligence and big data technology, biometric information has become widely used in applications across industries, such as biometric authentication and telemedicine…”
Get full text
Journal Article -
14
A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI AG 22.01.2023Published in Sensors (Basel, Switzerland) (22.01.2023)“…Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments…”
Get full text
Journal Article -
15
A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2019Published in IEEE access (2019)“…The face recognition has become a common means of identity authentication because of the advantages of uniqueness, non-invasive and not easy to be stolen…”
Get full text
Journal Article -
16
Optimization of Service Performance for Green Electricity Trading Platform Based on Distributed Authentication
Published: IEEE 28.11.2024Published in 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM) (28.11.2024)“… But with the explosive growth of transaction data, centralized authentication models face service capacity bottlenecks…”
Get full text
Conference Proceeding -
17
Robust authentication using the unconstrained infrared face images
ISSN: 0957-4174, 1873-6793Published: Amsterdam Elsevier Ltd 15.10.2014Published in Expert systems with applications (15.10.2014)“…•Two classifies are developed for robust authentication.•Promising results are achieved on both the constrained and the unconstrained IR Face database…”
Get full text
Journal Article -
18
A distributed identity management and cross-domain authentication scheme for the Internet of Things
ISSN: 0167-739XPublished: Elsevier B.V 01.08.2025Published in Future generation computer systems (01.08.2025)“…) management and authentication schemes. However, the widespread adoption of SSI still faces some challenges, such as key loss and the inefficiency of MerkleTree verification…”
Get full text
Journal Article -
19
Robust ear based authentication using Local Principal Independent Components
ISSN: 0957-4174, 1873-6793Published: Amsterdam Elsevier Ltd 15.11.2013Published in Expert systems with applications (15.11.2013)“…•Experiments carried out on the ear based authentication under both constrained and unconstrained environments are very promising…”
Get full text
Journal Article -
20
Single password authentication
ISSN: 1389-1286, 1872-7069Published: Kidlington Elsevier B.V 09.09.2013Published in Computer networks (Amsterdam, Netherlands : 1999) (09.09.2013)“…Users frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks,…”
Get full text
Journal Article