2016
DOI: 10.1109/tim.2015.2503863
|View full text |Cite
|
Sign up to set email alerts
|

ECG Authentication for Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
86
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 169 publications
(90 citation statements)
references
References 43 publications
1
86
0
Order By: Relevance
“…We have increased the accuracy rate and reduced the false accept rate significantly, comparing with previoues related work like in [1,6] cases. By reducing the false accepted rate, the authentication accuracy will be steadily increased.…”
Section: Resultssupporting
confidence: 52%
See 2 more Smart Citations
“…We have increased the accuracy rate and reduced the false accept rate significantly, comparing with previoues related work like in [1,6] cases. By reducing the false accepted rate, the authentication accuracy will be steadily increased.…”
Section: Resultssupporting
confidence: 52%
“…The security level at a system is measured by the system immunity against intrusion and fake signature to identify the person during the authentication process [1]. Technically, some biometric methods have strong uniqueness such as scanning iris and retina.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security issues for IoT systems or mobile devices have been addressed in many papers [22][23][24][25][26][27][28]. In particular, Mohamed et al [23] proposed a game-based model for adaptive security in the IoT, with an emphasis on eHealth applications.…”
Section: Related Studiesmentioning
confidence: 99%
“…Authentication is to identify users to enable services for legitimate users only, and is considered one of the key aspects of security issues. Biometric authentication [25][26][27][28] has been the most popular method for individual identification. Biometric authentication involves the comparison of an input data with stored biometric data to identify a specific user.…”
Section: Related Studiesmentioning
confidence: 99%