Visible to the public Biblio

Filters: Keyword is encryption technology  [Clear All Filters]
2020-08-10
Zhang, Xinman, He, Tingting, Xu, Xuebin.  2019.  Android-Based Smartphone Authentication System Using Biometric Techniques: A Review. 2019 4th International Conference on Control, Robotics and Cybernetics (CRC). :104–108.
As the technological progress of mobile Internet, smartphone based on Android OS accounts for the vast majority of market share. The traditional encryption technology cannot resolve the dilemma in smartphone information leakage, and the Android-based authentication system in view of biometric recognition emerge to offer more reliable information assurance. In this paper, we summarize several biometrics providing their attributes. Furthermore, we also review the algorithmic framework and performance index acting on authentication techniques. Thus, typical identity authentication systems including their experimental results are concluded and analyzed in the survey. The article is written with an intention to provide an in-depth overview of Android-based biometric verification systems to the readers.
2019-01-31
Xue, Bai, Lu, Liu, Sikang, Hu, Yuanzhang, Li.  2018.  An Isolated Data Encryption Experiment Method by Utilizing Baseband Processors. Proceedings of the 2018 2Nd International Conference on Management Engineering, Software Engineering and Service Sciences. :176–181.

With the rapid development of Android systems and the growing of Android market, Android system has become a focus of developers and users. MTK6795 is System-on-a-chip (SoC), which is specially designed by MediaTek for high-end smart phones. It integrates the application processor and the baseband processor in just one chip. In this paper, a new encryption method based on the baseband processor of MT6795 SoC is proposed and successfully applied on one Android-based smart phone to protect user data. In this method, the encryption algorithm and private user data are isolated into two processors, which improves the security of users' private data.

2015-05-08
Miao Yingkai, Chen Jia.  2014.  A Kind of Identity Authentication under Cloud Computing Environment. Intelligent Computation Technology and Automation (ICICTA), 2014 7th International Conference on. :12-15.

An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Identity authentication scheme is proposed based on the voice and homomorphism technology. The scheme is divided into four stages, register and training template stage, voice login and authentication stage, authorization stage, and audit stage. The results prove the scheme has certain advantages in four aspects.