Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Craig Valli"'
Publikováno v:
IEEE Access, Vol 9, Pp 121975-121995 (2021)
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deployin
Externí odkaz:
https://doaj.org/article/054ff0ec9bbc463daf048abb016481a4
Publikováno v:
Journal of Information and Telecommunication, Vol 4, Iss 4, Pp 482-503 (2020)
Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular.
Externí odkaz:
https://doaj.org/article/db94d70ffd0845f181d9c17ae1f61e6e
Publikováno v:
ICT Express, Vol 5, Iss 1, Pp 37-40 (2019)
Biometrics as a tool for information security has been used in various applications. Feature-level fusion is widely used in the design of multi-biometric systems due to its advantages in increasing recognition accuracy and security. However, most exi
Externí odkaz:
https://doaj.org/article/3878db42d7bf4204ad2bfe275634caf6
Autor:
Guanglou Zheng, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, Li Qiao
Publikováno v:
IEEE Access, Vol 7, Pp 75629-75641 (2019)
An insulin pump is a small wearable medical gadget which can mimic the way a healthy pancreas functions by providing continuous subcutaneous insulin infusion for the patient. However, in the current products, the access to the pump is not securely co
Externí odkaz:
https://doaj.org/article/d26265e90d394b599e51481168079d32
Autor:
Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Chaudhry, Erwin Adi, Craig Valli
Publikováno v:
IEEE Access, Vol 6, Pp 36939-36947 (2018)
Most existing biometric systems designed for healthcare applications only use biometrics for authentication/access control without considering its other function-data encryption. In this paper, we propose a cancelable finger-vein-based bio-cryptosyst
Externí odkaz:
https://doaj.org/article/f6ab373827194a868c7a95f3cd29c1ae
Autor:
Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli
Publikováno v:
IEEE Access, Vol 6, Pp 19140-19150 (2018)
The task of protecting healthcare information systems (HIS) from immediate cyber security risks has been intertwined with cloud computing adoption. The data and resources of HISs are inherently shared with other systems for remote access, decision ma
Externí odkaz:
https://doaj.org/article/3edcd5e4a9c8433e8972e3631baecd1c
Publikováno v:
Sensors, Vol 21, Iss 18, p 6163 (2021)
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security
Externí odkaz:
https://doaj.org/article/72039f427d68447d8e4789bf492d1cc2
Autor:
Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli
Publikováno v:
IEEE Access, Vol 9, Pp 79628-79628 (2021)
In above article [1], reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as [2]. Therefore, the sentences in the article [1] with reference [11] should be cited [2] in
Externí odkaz:
https://doaj.org/article/0b2eadbfa5d142f0923fd82801f83f9a
Autor:
Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone, Craig Valli
Publikováno v:
Sensors, Vol 19, Iss 13, p 2985 (2019)
Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-
Externí odkaz:
https://doaj.org/article/89e6b06362ba430587d7012888f45ff9
Publikováno v:
Technologies, Vol 7, Iss 2, p 34 (2019)
The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cann
Externí odkaz:
https://doaj.org/article/751e5bd107ea4938a4c6f23f04f39c89