|
|
|
Sonia Díaz-Santos, Óscar Cigala-Álvarez, Ester Gonzalez-Sosa, Pino Caballero-Gil and Cándido Caballero-Gil
This paper introduces a cutting-edge approach that combines facial recognition and drowsiness detection technologies with Internet of Things capabilities, including 5G/6G connectivity, aimed at bolstering vehicle security and driver safety. The delineate...
ver más
|
|
|
|
|
|
|
Yi Zhao and Song-Kyoo Kim
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ...
ver más
|
|
|
|
|
|
|
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
Yajie Wang, Xiaomei Zhang and Haomin Hu
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been...
ver más
|
|
|
|
|
|
|
Farhad Ahamed, Farnaz Farid, Basem Suleiman, Zohaib Jan, Luay A. Wahsheh and Seyed Shahrestani
With the advent of modern technologies, the healthcare industry is moving towards a more personalised smart care model. The enablers of such care models are the Internet of Things (IoT) and Artificial Intelligence (AI). These technologies collect and ana...
ver más
|
|
|
|
|
|
|
Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend o...
ver más
|
|
|
|
|
|
|
Dania Marabissi, Lorenzo Mucchi and Andrea Stomaci
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigm...
ver más
|
|
|
|
|
|
|
Sultan Almalki, Nasser Assery and Kaushik Roy
While the password-based authentication used in social networks, e-mail, e-commerce, and online banking is vulnerable to hackings, biometric-based continuous authentication systems have been used successfully to handle the rise in unauthorized accesses. ...
ver más
|
|
|
|
|
|
|
Lorenzo Bracciale, Pierpaolo Loreti, Claudio Pisa and Alex Shahidi
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistical...
ver más
|
|
|
|