2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC) 2015
DOI: 10.1109/dinwc.2015.7054225
|View full text |Cite
|
Sign up to set email alerts
|

CaNViS: A cardiac and neurological-based verification system that uses wearable sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…IoT requires authentication for the protection, services, and advantages of utilising wearable sensors to authenticate individuals protected by this article. IoT is recursively applied, e.g., IoT also requires authorisation as these are required for the authentication of wearable sensors ( van der Haar, 2015 ). Munch-Ellingsen et al boosted their opinion of 2 nd factor authentication by utilising coupled/hardware-based authentication.…”
Section: Related Workmentioning
confidence: 99%
“…IoT requires authentication for the protection, services, and advantages of utilising wearable sensors to authenticate individuals protected by this article. IoT is recursively applied, e.g., IoT also requires authorisation as these are required for the authentication of wearable sensors ( van der Haar, 2015 ). Munch-Ellingsen et al boosted their opinion of 2 nd factor authentication by utilising coupled/hardware-based authentication.…”
Section: Related Workmentioning
confidence: 99%
“…There are also many medical ways to recognize users. Dustin van der Haar et al [ 15 ] presented a biometric identification method based on a hybrid attribute. They built a system named CaNViS to classify people by their Electrocardiogram (ECG) and the Electroencephalogram (EEG), which are the most common bio-signals in the medical field.…”
Section: Related Workmentioning
confidence: 99%
“…As more attention has recently been paid to user authentication, researchers have proposed various edge computing authentication methods, which mainly include the following three types. The first type of authentication method is based on the user’s physiological biometrics, such as the relevant attributes of the eyes [ 13 , 14 ], Electrocardiogram (ECG), and Electroencephalogram (EEG) [ 15 , 16 ], as well as the body’s feedback of external stimuli [ 17 , 18 ]. Specific sensors should be included in smartwatches with these methods.…”
Section: Introductionmentioning
confidence: 99%