2016
DOI: 10.1007/978-3-319-47301-7_15
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…When message ‘A’ is sent by the user, the system computes F(A) randomly and checks with stored data ‘B’. A single authentication password alone cannot ensure the authentication of the user ( Benarous, Kadri & Bouridane, 2017 ; Mohsin et al, 2017 ). Accessing sensitive data offline or online requires a fundamental security system for authentication ( Mohsin et al, 2017 ; Balloon, 2001 ; Ometov et al, 2018 ) ( Fig.…”
Section: Introductionmentioning
confidence: 99%
“…When message ‘A’ is sent by the user, the system computes F(A) randomly and checks with stored data ‘B’. A single authentication password alone cannot ensure the authentication of the user ( Benarous, Kadri & Bouridane, 2017 ; Mohsin et al, 2017 ). Accessing sensitive data offline or online requires a fundamental security system for authentication ( Mohsin et al, 2017 ; Balloon, 2001 ; Ometov et al, 2018 ) ( Fig.…”
Section: Introductionmentioning
confidence: 99%
“…Various security risks and attacks exist in vehicular networks such as isolation and message dropping, Sybil attack, selective forwarding attack … etc. However, one of the most crucial issues is privacy which may contradict with the authentication and nonrepudiation requirements …”
Section: Introductionmentioning
confidence: 99%
“…This paper addresses the need for a secure and cancelable biometric template generation as an illustration to ear biometrics. The human outer ear as a biometric has gained popularity among the research community [2] owing to its comparable complexity with face in terms of robustness, distinctiveness, availability, accessibility and acceptability [3]. The ear is also being used in Android [4] and iOS applications [5].…”
Section: Introductionmentioning
confidence: 99%