2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems 2012
DOI: 10.1109/red.2012.6338394
|View full text |Cite
|
Sign up to set email alerts
|

Secret sharing in continuous access control system, using heart sounds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…The system abandons the centralized approach which entrenches social networks for Wi-Fi authentication instead the system has introduced a decentralized approach EAP-Soc-TLS, for authorization and authentication of Wi-Fi access points and numerous additional devices, thus providing a much better solution in terms of scalability than the conventional centralized approaches which face single point failure problems and raise privacy concerns. A practical and secure authentication mechanism founded on smart cards has been proposed in [21]. The proposed system delivers protection against various susceptibilities while at the same time improving existing security schemes.…”
Section: Non-biometric-based Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…The system abandons the centralized approach which entrenches social networks for Wi-Fi authentication instead the system has introduced a decentralized approach EAP-Soc-TLS, for authorization and authentication of Wi-Fi access points and numerous additional devices, thus providing a much better solution in terms of scalability than the conventional centralized approaches which face single point failure problems and raise privacy concerns. A practical and secure authentication mechanism founded on smart cards has been proposed in [21]. The proposed system delivers protection against various susceptibilities while at the same time improving existing security schemes.…”
Section: Non-biometric-based Systemsmentioning
confidence: 99%
“…The challenges identified range from security vulnerability to computational complexity to user adoptability. Conclusively, the progressive review conducted will end with the following open issues: a) Reduced user adoptability persists due to extra hardware requirements existing in the form of smart cards, specially featured hardware [13], [21], [40], [38], [43]. b) Prominent processing power and execution time subsist [21], [22], resulting in subsequent incompatibility to operate on generic mobile devices.…”
Section: Open Issuesmentioning
confidence: 99%
See 2 more Smart Citations