2018
DOI: 10.1109/tifs.2017.2777787
|View full text |Cite
|
Sign up to set email alerts
|

PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(32 citation statements)
references
References 25 publications
0
32
0
Order By: Relevance
“…Hu et al [18] improved the privacy preservation scheme to examine the processing capacity and bandwidth consumption. Gunasinghe et al [17] proposed a privacy-preserving biometric-based authentication for smart devices. Liu et al [30] aimed to design a cooperative privacy preservation that considers space-ware and timeaware contexts.…”
Section: Related Workmentioning
confidence: 99%
“…Hu et al [18] improved the privacy preservation scheme to examine the processing capacity and bandwidth consumption. Gunasinghe et al [17] proposed a privacy-preserving biometric-based authentication for smart devices. Liu et al [30] aimed to design a cooperative privacy preservation that considers space-ware and timeaware contexts.…”
Section: Related Workmentioning
confidence: 99%
“…The SVM is a popular and powerful binary classifier, which aims to find a hyperplane within the feature space that separates between two classes. SVM is used by seven authentication schemes for IoT devices in edge environments using bio-features [25], [31], [32], [33], [34], [35], [36].…”
Section: A Support-vector Machine (Svm)mentioning
confidence: 99%
“…In another study, the SVM classifier was attempted as the learning algorithm by Gunasinghe and Bertino [34], face as the bio-feature , and eigen faces as the feature extraction algorithm. The trained SVM classifier helps to the artifacts stored in the Mobile IoT devices.…”
Section: A Support-vector Machine (Svm)mentioning
confidence: 99%
See 1 more Smart Citation
“…Authentication [3] also allows accountability based on the possibility of mapping the access link and concurrent actions to identities. The techniques of authentication are classified into three essential categories which are token-based authentication, biometric based authentication [4] and knowledge-based authentication system [5]. Fig.…”
Section: Introductionmentioning
confidence: 99%