Search Results - Distributed face authentication

Refine Results
  1. 1

    MPCAuth: Multi-factor Authentication for Distributed-trust Systems by Tan, Sijun, Chen, Weikeng, Deng, Ryan, Popa, Raluca Ada

    ISSN: 2375-1207
    Published: IEEE 01.05.2023
    “…). Authentication for these distributed-trust systems faces two challenges. The first challenge is ease-of-use…”
    Get full text
    Conference Proceeding
  2. 2

    Immersive online biometric authentication algorithm for online guiding based on face recognition and cloud-based mobile edge computing by Su, Peng

    ISSN: 0926-8782, 1573-7578
    Published: New York Springer US 01.06.2023
    “…The Internet deconstructs and reshapes the traditional classroom organization, the status of teachers, the authority of teaching materials and the role of…”
    Get full text
    Journal Article
  3. 3

    Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain by Umoren, Otuekong, Singh, Raman, Pervez, Zeeshan, Dahal, Keshav

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 23.05.2022
    Published in Sensors (Basel, Switzerland) (23.05.2022)
    “… Fog computing offers solutions to those limitations; nevertheless, owning to its intrinsic distributed architecture, it faces challenges in the form of security of fog devices, secure authentication and privacy…”
    Get full text
    Journal Article
  4. 4

    Authentication Framework With Enhanced Privacy and Batch Verifiable Message Sharing in VANETs by Naskar, Sujash, Brunetta, Carlo, Zhang, Tingting, Hancke, Gerhard, Gidlund, Mikael

    ISSN: 0018-9545, 1939-9359, 1939-9359
    Published: New York IEEE 2025
    “…Vehicular Ad Hoc Networks (VANETs) are the backbone of intelligent transport and enhanced passenger safety, but they face significant challenges related to authentication, security, and privacy…”
    Get full text
    Journal Article
  5. 5

    A Three-Party Batch Authentication Based on Twisted Edwards Curve in Mobile Edge Computing by Dong, Jiarui, Tian, Junfeng

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 15.11.2025
    Published in IEEE internet of things journal (15.11.2025)
    “… However, the existing authentication mechanism faces multiple challenges: the Denial-of-Service (DoS…”
    Get full text
    Journal Article
  6. 6

    Privacy-Preserving Continuous User Authentication Using Federated Learning by Bouldjedri, Oussama, Wazzeh, Mohamed, Sami, Hani, Talhi, Chamseddine, Ould-Slimane, Hakima

    ISSN: 2376-6506
    Published: IEEE 12.05.2025
    “… Despite its promise, FL faces unique challenges in continuous user authentication, particularly due to the non-IID…”
    Get full text
    Conference Proceeding
  7. 7

    Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition by Chen, Xiang, Xu, Shouzhi, Ma, Kai, Chen, Peng

    ISSN: 2078-2489, 2078-2489
    Published: Basel MDPI AG 01.11.2022
    Published in Information (Basel) (01.11.2022)
    “… it become a hot spot of market application. Users of a consortium system may register and log in different target domains to get the access authentications, so how to access resources in different domains efficiently to avoid the trust-island…”
    Get full text
    Journal Article
  8. 8

    Distributed Aggregate Privacy-Preserving Authentication in VANETs by Lei Zhang, Qianhong Wu, Domingo-Ferrer, Josep, Bo Qin, Chuanyan Hu

    ISSN: 1524-9050, 1558-0016
    Published: IEEE 01.03.2017
    “…Existing secure and privacy-preserving vehicular communication protocols in vehicular ad hoc networks face the challenges of being fast and not depending on ideal tamper-proof devices (TPDs…”
    Get full text
    Journal Article
  9. 9

    A Threshold Multi-CA Authentication Model for Privacy-Preserving Federated Semi-Supervised Learning in Healthcare IoT by Wang, Zhoukai, Xiang, Chen, Wei, Jiakai, Zhang, Dawei, Su, Shen, Liu, Lei

    ISSN: 0098-3063, 1558-4127
    Published: New York IEEE 01.08.2025
    Published in IEEE transactions on consumer electronics (01.08.2025)
    “… While existing FSSL frameworks offer collaborative learning capabilities, the reliance on centralized authentication architectures may face challenges in balancing security and operational efficiency…”
    Get full text
    Journal Article
  10. 10

    A Distributed Authentication Scheme Based on Zero-knowledge Proof by Qin, Lang, Ma, Feng, Xie, Hao Geng, Zhang, Sheng Li

    Published: IEEE 15.01.2021
    “…As an underlying technology and infrastructure, blockchain creates great value when combining with other emerging information technologies, such as Artificial…”
    Get full text
    Conference Proceeding
  11. 11

    Facial authentication-based smart door lock system and anomaly detection using machine learning architectures integrated with IoT by Derbali, Morched, Harbaoui, Ahmed, Jarrah, Mutasem, khoualdi, Kamel Taher

    ISSN: 0252-2667, 2169-0103
    Published: 01.09.2025
    “… An SDL system that relies on face authentication and intrusion detection is the goal of this project, which intends to use…”
    Get full text
    Journal Article
  12. 12

    Multimodal Personal Ear Authentication Using Acoustic Ear Feature for Smartphone Security by Itani, Shunji, Kita, Shunsuke, Kajikawa, Yoshinobu

    ISSN: 0098-3063, 1558-4127
    Published: New York IEEE 01.02.2022
    Published in IEEE transactions on consumer electronics (01.02.2022)
    “…In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition…”
    Get full text
    Journal Article
  13. 13

    Low latency and secure data encryption for multi-hop biometric authentication in distributed networks by Lee, Sun-Jin, Lee, Jin-Min, Lee, Il-Gu

    ISSN: 2542-6605, 2542-6605
    Published: Elsevier B.V 01.03.2025
    Published in Internet of things (Amsterdam. Online) (01.03.2025)
    “…Because of the rapid development of artificial intelligence and big data technology, biometric information has become widely used in applications across industries, such as biometric authentication and telemedicine…”
    Get full text
    Journal Article
  14. 14

    A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services by Yu, Linsheng, He, Mingxing, Liang, Hongbin, Xiong, Ling, Liu, Yang

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 22.01.2023
    Published in Sensors (Basel, Switzerland) (22.01.2023)
    “…Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments…”
    Get full text
    Journal Article
  15. 15

    A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication by Wang, Xiang, Xue, Heyu, Liu, Xuefeng, Pei, Qingqi

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2019
    Published in IEEE access (2019)
    “…The face recognition has become a common means of identity authentication because of the advantages of uniqueness, non-invasive and not easy to be stolen…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Robust authentication using the unconstrained infrared face images by Mamta, Hanmandlu, Madasu

    ISSN: 0957-4174, 1873-6793
    Published: Amsterdam Elsevier Ltd 15.10.2014
    Published in Expert systems with applications (15.10.2014)
    “…•Two classifies are developed for robust authentication.•Promising results are achieved on both the constrained and the unconstrained IR Face database…”
    Get full text
    Journal Article
  18. 18

    A distributed identity management and cross-domain authentication scheme for the Internet of Things by Wang, Miaomiao, Wang, Ze

    ISSN: 0167-739X
    Published: Elsevier B.V 01.08.2025
    Published in Future generation computer systems (01.08.2025)
    “…) management and authentication schemes. However, the widespread adoption of SSI still faces some challenges, such as key loss and the inefficiency of MerkleTree verification…”
    Get full text
    Journal Article
  19. 19

    Robust ear based authentication using Local Principal Independent Components by Mamta, Hanmandlu, Madasu

    ISSN: 0957-4174, 1873-6793
    Published: Amsterdam Elsevier Ltd 15.11.2013
    Published in Expert systems with applications (15.11.2013)
    “…•Experiments carried out on the ear based authentication under both constrained and unconstrained environments are very promising…”
    Get full text
    Journal Article
  20. 20

    Single password authentication by Acar, Tolga, Belenkiy, Mira, Küpçü, Alptekin

    ISSN: 1389-1286, 1872-7069
    Published: Kidlington Elsevier B.V 09.09.2013
    “…Users frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks,…”
    Get full text
    Journal Article