Assistive Technology for the Elderly 2020
DOI: 10.1016/b978-0-12-818546-9.00003-8
|View full text |Cite
|
Sign up to set email alerts
|

Securing the elderly in cyberspace with fingerprints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Zheng et al [112] proposed a finger-to-heart authentication technique that aims to utilize the patient's fingerprint for granting access to the IMD. In another work, Zheng et al [113] used fingerprint information to safeguard elderly people suffering from memory loss and protect them from malicious adversaries in IoMT systems. Shakil et al [114] proposed a biometric-based authentication scheme to secure health data using a behavioral biometric signature.…”
Section: Biometricsmentioning
confidence: 99%
“…Zheng et al [112] proposed a finger-to-heart authentication technique that aims to utilize the patient's fingerprint for granting access to the IMD. In another work, Zheng et al [113] used fingerprint information to safeguard elderly people suffering from memory loss and protect them from malicious adversaries in IoMT systems. Shakil et al [114] proposed a biometric-based authentication scheme to secure health data using a behavioral biometric signature.…”
Section: Biometricsmentioning
confidence: 99%
“…The performance of the fingerprint sensors is based on the extraction algorithm that is used. Popular algorithms used in these sensors are Delaunay Triangulation-based feature representation, Pair-polar coordinate-based feature representation, and Minutia Cylinder-Code-based feature representation [47]. According to Zheng et al, Delaunay shows better performance and is less complicated than the other techniques.…”
Section: A Biometricsmentioning
confidence: 99%
“…It can be avoided using symmetric/asymmetric techniques, such as CHF, or keyless techniques, such as biometrics [24,31,46,47].…”
Section: ) Impersonation/presentationmentioning
confidence: 99%