Results (2)
Search Parameters:
Keyword: AuthenticityComposition of Methods to Ensure Iris Liveness and Authenticity
Advances in Science, Technology and Engineering Systems Journal,
Volume 5,
Issue 4,
Page # 130–143,
2020;
DOI: 10.25046/aj050417
Abstract:
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read More(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Bioinformatics (BIF))
Taxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
by Kartit Zaid and Diouri Ouafaa
Advances in Science, Technology and Engineering Systems Journal,
Volume 7,
Issue 2,
Page # 25–31,
2022;
DOI: 10.25046/aj070203
Abstract:
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read More(This article belongs to Section Network Engineering (ENW))
