Filters








6,376 Hits in 4.3 sec

Blockchain and Biometrics: A First Look into Opportunities and Challenges [article]

Oscar Delgado-Mohatar, Julian Fierrez, Ruben Tolosana, Ruben Vera-Rodriguez
2019 arXiv   pre-print
In this study we explore the potential of blockchain for biometrics, analyzing how both technologies can mutually benefit each other.  ...  in more detail blockchain for biometric template protection.  ...  Acknowledgements Research supported by project TEC2015-70627-R (MINECO/FEDER), UAM-CecaBank chair on Biometrics, and UAM-GrantThornton chair on Blockchain.  ... 
arXiv:1903.05496v1 fatcat:bz7sjwqhqvdn7enynp4jbkyf5i

The analysis of security and privacy risks in smart education environments

Anton Kamenskih
2022 Journal of Smart Cities and Society  
As the result, the analysis identifies key information security technologies development of which is necessary for the sustainable development of a smart educational environment as part of a smart city  ...  The article provides a basic analysis of security and privacy risks for smart education environments.  ...  Acknowledgements The author would like to thank the reviewers for their useful feedback that helped to make the paper better.  ... 
doi:10.3233/scs-210114 fatcat:n27fvxuwvjfelasji2zlnluog4

A Survey Study of the Current Challenges and Opportunities of Deploying the ECG Biometric Authentication Method in IoT and 5G Environments

Ahmed Younes Shdefat, Nour Mostafa, Louai Saker, Ahmet Topcu
2021 Indonesian Journal of Electrical Engineering and Informatics (IJEEI)  
The environment prototype of the Internet of Things (IoT) has opened the horizon for researchers to utilize such environments in deploying useful new techniques and methods in different fields and areas  ...  The number of smart factories, for example, is expected to increase dramatically in the upcoming years with new trends of manufacturing that depend on smart IoT devices, inevitably moving in the direction  ...  Figure 1 . 1 Biometric technologies used in applications in 2018 A 125 Figure 2 . 1252 Survey Study of Challenges and Opportunities of ECG Biometric Authentication -(Ahmed Shdefat et al.)  ... 
doi:10.52549/ijeei.v9i2.2890 fatcat:cvfkcwspvbf2hdcawv4xbxpm34

Biometric Template Storage with Blockchain: A First Look into Cost and Performance Tradeoffs

Oscar Delgado-Mohatar, Julian Fierrez, Ruben Tolosana, Ruben Vera-Rodriguez
2019 arXiv   pre-print
Blockchain technologies provide excellent architectures and practical tools for securing and managing the sensitive and private data stored in biometric templates, but at a cost.  ...  We first discuss opportunities and challenges in the integration of blockchain and biometrics, with emphasis in biometric template storage and protection, a key problem in biometrics still largely unsolved  ...  Acknowledgments This work has been supported by projects: BIBECA (TEC2018 MINECO), Bio-Guard (Ayudas Fundacin BBVA a Equipos de Investigacin Cientfica 2017), UAM Cecabank chair on Biometrics, and UAM-Grant  ... 
arXiv:1904.13128v1 fatcat:mujnuhq3g5hshkijfuhyhg4s3a

Multimodal Biometrics For Identity Documents And Smart Cards: European Challenge

A. Drygajlo
2007 Zenodo  
Publication in the conference proceedings of EUSIPCO, Poznan, Poland, 2007  ...  creation of evaluation models to estimate the performance of biometric technologies and, for each scenario, analysis of opportunities and risks associated with the implementation. • To investigate the  ...  intentions and behaviour, in dynamically changing environments.  ... 
doi:10.5281/zenodo.40238 fatcat:fbx2gf47ozak5cqxoe3yr6wblu

Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics [article]

Dheerendra Mishra
2014 arXiv   pre-print
Advancement in communication technology provides a scalable platform for various services where a remote user can access the server from anywhere without moving from its place.  ...  It has provided a unique opportunity for online services, such that the user need not physically present at the service center.  ...  In 2011, Yoon and Yoo [4] also presented a biometric-based authenticated key agreement scheme for multi-server environment.  ... 
arXiv:1401.4790v1 fatcat:s3zj5ud3brhvnf7vn6aixvkmre

Blockchain meets Biometrics: Concepts, Application to Template Protection, and Trends [article]

Oscar Delgado-Mohatar, Julian Fierrez, Ruben Tolosana, Ruben Vera-Rodriguez
2020 arXiv   pre-print
Blockchain technologies provide excellent architectures and practical tools for securing and managing the sensitive and private data stored in biometric templates, but at a cost.  ...  We discuss opportunities and challenges in the integration of blockchain and biometrics, with emphasis in biometric template storage and protection, a key problem in biometrics still largely unsolved.  ...  This analysis results crucial in terms of economic cost for the integration of the biometric technology in blockchain.  ... 
arXiv:2003.09262v1 fatcat:55qtgvu7arcqdpn4z7qew3ttrm

PROSPECTS OF NEXT GENERATION DIGITAL LIBRARIES
GƏLƏCƏK NƏSİL ELEKTRON KİTABXANALARIN FORMALAŞMASI PERSPEKTİVLƏRİ

Rasim Alguliyev, Nigar Ismayilova
2017 Problems of Information Society  
The application of big data and cloud technologies in e-Libraries Currently, cloud technologies are widely used for data storage and processing in a virtual environment.  ...  In this regard, the use of biometric technology would be more reasonable.  ... 
doi:10.25045/jpis.v08.i1.01 fatcat:tlgnued6s5ec5amfrgdx6bjug4

AGE: authentication in gadget-free healthcare environments

Tanesh Kumar, An Braeken, Anca Delia Jurcut, Madhusanka Liyanage, Mika Ylianttila
2019 Journal of Special Topics in Information Technology and Management  
However, the recent technological advancements in smart and ambient environments are offering users new ways to access the healthcare services without using any explicit gadgets.  ...  This paper proposes an anonymous and privacy-preserving biometrics based authentication scheme for such gadget-free healthcare environment.  ...  distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creat iveco mmons .org/licen ses/by/4.0/), which permits unrestricted use, distribution, and reproduction in  ... 
doi:10.1007/s10799-019-00306-z fatcat:sl2dclm5z5dedc4vyayh3lxowy

Application Specific Internet of Things (ASIoTs): Taxonomy, Applications, Use Case and Future Directions

Li-Minn Ang, Kah Phooi Seng
2019 IEEE Access  
in the literature; Second, we discuss a use case for a biometrics-based ASIoT (termed IoBioT) for illustration and experiments of face-based biometric recognition on IoBioT are also performed; and Third  ...  An objective of this paper is to spur researchers and facilitate the development of ASIoTs for the different user-defined domains, communication mediums, and technology constrained platforms.  ...  Similarly, the security and privacy requirements for an IoT-based smart home would be different from that for an IoT to be deployed in a manufacturing environment.  ... 
doi:10.1109/access.2019.2907793 fatcat:452pgupu7zgpvjt62zv5br7dpm

Beyond Sarbanes–Oxley compliance

P. Foote, T. Neudenberger
2005 Computers & security  
All functions in bioLock can be protected either with biometrics or smart card or both.  ...  The biometrics research program is part of the Forum for Advanced Security Technologies (FAST).  ... 
doi:10.1016/j.cose.2005.07.005 fatcat:ssjjfmco7zam3lpnq4rdrnkery

Towards gadget-free internet services: A roadmap of the Naked world

Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Mika Ylianttila, Timo Koskela, Timo Braysy, Antti Anttonen, Vesa Pentikinen, Juha- Pekka Soininen, Jyrki Huusko
2018 Telematics and informatics  
When a user in the Naked world intends to use a service, the infrastructure senses the user, the nearby intelligent surrounding launches an interactive user interface, performs identification through biometric  ...  This paper presents a roadmap for the transition from current gadget-centric digital services towards a gadget-free services environment called the Naked world.  ...  These devices are already available in different forms for example smart wristwatches, smart jackets, smart glasses, smart rings, etc.  ... 
doi:10.1016/j.tele.2017.09.020 fatcat:zsf4qzldtjgnlomubpisyd4eiu

Security of IoT Automated Devices Using Different Authentication Methods

Nikhil Kumar, Pushpneel Verma, Ajay Singh
2022 International journal of computer science and mobile computing  
Results: Insecure authentication process biometrics, PINs, and other methods offer additional security for IoT that is autonomously implemented.  ...  A wide acceptance of IoT in applications in every field is constantly gathering sensitive data and providing an increased surface for hackers.  ...  In this new era, Internet has expanded beyond communication devices to enterprise products and assets as well as consumer products. IoT makes a smart environment.  ... 
doi:10.47760/ijcsmc.2022.v11i02.014 fatcat:bvuk454hwndvfeydksu7apjmlq

A Survey on Privacy-preserving Blockchain Systems (PPBS) and A Novel PPBS-based Framework for Smart Agriculture

Quang Tran, Benjamin Turnbull, Hao-Tian Wu, A.J.S De Silva, Katerina Kormusheva, Jiankun Hu
2021 IEEE Open Journal of the Computer Society  
This work then proposes PPSAF, a new privacy-preserving framework designed explicitly for the issues that are present in smart agriculture.  ...  INDEX TERMS Biometrics, blockchain, consensus protocol, internet of things, privacy, privacypreservation, smart agriculture, smart energy.  ...  The future trends for privacy protection in blockchain have also been discussed, as we expect advances in the areas of blockchain and privacypreservation to create new opportunities in e-voting, smart  ... 
doi:10.1109/ojcs.2021.3053032 fatcat:aq6mhfnzbnga5o2jkxjrjmigt4

Security Assessment of Cloud Based Computing(IACC'09.pdf [article]

MOHIT MATHUR
2021 figshare.com  
This paper emphasizes the authentication aspect of security in the cloud computing environment and some suggested solutions for that.  ...  Authentication in an Cloud Environment guide identified that simple-password authentication is insufficient for ensuring authorized access to important cloud services.  ...  Similarly, to use the same machine in sequence, multiple users must all use the same smart card technology. In addition, smart card technology can be expensive.  ... 
doi:10.6084/m9.figshare.15073128.v1 fatcat:r2tcfa5dbvabroqi62mkv6kapm
« Previous Showing results 1 — 15 out of 6,376 results