Abstract The majority of studies in the field of developing identification and authentication protocols for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a relatively new approach in this field. EEG signal‐based authentication algorithms typically use feature extraction algorithms that require high processing time. On the other hand, the dynamic nature of the EEG signal makes its use for identification/authentication difficult without relying on feature extraction. This paper presents an EEG‐and fingerprint‐based two‐stage identification‐authentication protocol for remote healthcare, which is fast, robust, and multilayer‐based. A modified Euclidean distance pattern matching method is proposed to match t...
Security authentication defines the process of verifying the identity of a person. For many years, a...
This paper presents a comparison and analysis of six feature extraction methods which were often cit...
EEG brainwaves have recently emerged as a promis-ing biometric that can be used for individual ident...
In this paper, a new authentication method has been proposed for the Internet of Things (IoT) device...
The neuronal activity has a unique genetic signature that can be used for personal identification an...
As the technology advancing at phenomenal rate, security had become an integral part of life. Regard...
Abstract –In security related areas human identification holds a key factor. This paper discusses th...
Electroencephalography (EEG), a method of continuously recording the electrical activity of the brai...
We propose to use EEG signals to make user authentication for requiring high security. EEG signals w...
Abstract—As human brain activities, represented by EEG brainwave signals, are more confidential, sen...
Studies have shown that the electroencephalogram (EEC) recordings have unique pattern for each indiv...
This chapter starts with the introduction to various types of authentication modalities, before disc...
In recent years, the need for greater security for storing personal and business data or accessing c...
Commercial use of biometric authentication is becoming increasingly popular, which has sparked the d...
The task of monitoring human health invasively and maintaining the security of any system is challen...
Security authentication defines the process of verifying the identity of a person. For many years, a...
This paper presents a comparison and analysis of six feature extraction methods which were often cit...
EEG brainwaves have recently emerged as a promis-ing biometric that can be used for individual ident...
In this paper, a new authentication method has been proposed for the Internet of Things (IoT) device...
The neuronal activity has a unique genetic signature that can be used for personal identification an...
As the technology advancing at phenomenal rate, security had become an integral part of life. Regard...
Abstract –In security related areas human identification holds a key factor. This paper discusses th...
Electroencephalography (EEG), a method of continuously recording the electrical activity of the brai...
We propose to use EEG signals to make user authentication for requiring high security. EEG signals w...
Abstract—As human brain activities, represented by EEG brainwave signals, are more confidential, sen...
Studies have shown that the electroencephalogram (EEC) recordings have unique pattern for each indiv...
This chapter starts with the introduction to various types of authentication modalities, before disc...
In recent years, the need for greater security for storing personal and business data or accessing c...
Commercial use of biometric authentication is becoming increasingly popular, which has sparked the d...
The task of monitoring human health invasively and maintaining the security of any system is challen...
Security authentication defines the process of verifying the identity of a person. For many years, a...
This paper presents a comparison and analysis of six feature extraction methods which were often cit...
EEG brainwaves have recently emerged as a promis-ing biometric that can be used for individual ident...