4.7 Article

An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles

Related references

Note: Only part of the references are listed.
Review Computer Science, Information Systems

Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges

Shubhani Aggarwal et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A robust distance-based relay selection for message dissemination in vehicular network

Dun Cao et al.

WIRELESS NETWORKS (2020)

Article Computer Science, Information Systems

Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications

Bo Yin et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

An empower hamilton loop based data collection algorithm with mobile agent for WSNs

Jin Wang et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2019)

Article Engineering, Electrical & Electronic

Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network

Xinghua Li et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

Multimodel Framework for Indoor Localization Under Mobile Edge Computing Environment

Wenjun Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones

Hasini Gunasinghe et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

PassBio: Privacy-Preserving User-Centric Biometric Authentication

Kai Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

The impact of application context on privacy and performance of keystroke authentication systems

Kiran S. Balagani et al.

JOURNAL OF COMPUTER SECURITY (2018)

Article Computer Science, Information Systems

Mobile relay deployment in multihop relay networks

Zhuofan Liao et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Information Systems

An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics

Nan Zheng et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2016)

Article Computer Science, Hardware & Architecture

Multimodal Biometrics for Enhanced Mobile Device Security

Mikhail I. Gofman et al.

COMMUNICATIONS OF THE ACM (2016)

Article Computer Science, Theory & Methods

HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users

Zdenka Sitova et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Targeted Online Password Guessing: An Underestimated Threat

Ding Wang et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Information Systems

Reconciling user privacy and implicit authentication for mobile devices

Siamak F. Shahandashti et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

Continuous user authentication using multi-modal biometrics

Hataichanok Saevanee et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Theory & Methods

Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones

Jaroslav Sedenka et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme

Thang Hoang et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Proceedings Paper Computer Science, Cybernetics

Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices

Daniel Buschek et al.

CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2015)

Proceedings Paper Computer Science, Theory & Methods

Transparent GPU Execution of NumPy Applications

Troels Blum et al.

PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW) (2014)

Proceedings Paper Computer Science, Software Engineering

Seeing beyond visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices

Farzana Rahman et al.

2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014) (2014)

Proceedings Paper Imaging Science & Photographic Technology

Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data

Chris McCool et al.

2012 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW) (2012)