{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:33:58Z","timestamp":1774539238154,"version":"3.50.1"},"reference-count":0,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish emerging challenges. This research article aims to critically investigate and synthesize current research using biometric cryptosystems that use behavior or medico-chemical characteristics, ranging from gate analysis to gaze tracking. The study will summarize the state of knowledge, identify critical research gaps, and provide insight into promising future implications and applications that can enable the realization of user-specific and resilient solutions for authentication and secure communication demands.<\/jats:p>","DOI":"10.3390\/cryptography8030027","type":"journal-article","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T08:50:08Z","timestamp":1718959808000},"page":"27","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Emerging Challenges of Wearable Biometric Cryptosystems"],"prefix":"10.3390","volume":"8","author":[{"given":"Khalid Al","family":"Ajlan","sequence":"first","affiliation":[{"name":"Royal Academy of Police, Ministry of Interior, Manama 33305, Bahrain"}]},{"given":"Tariq","family":"Alsboui","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield HD1 3DH, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1350-8933","authenticated-orcid":false,"given":"Omar","family":"Alshaikh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield HD1 3DH, UK"}]},{"given":"Isa","family":"Inuwa-Dute","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield HD1 3DH, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-8200","authenticated-orcid":false,"given":"Saad","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield HD1 3DH, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1747-9914","authenticated-orcid":false,"given":"Simon","family":"Parkinson","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield HD1 3DH, UK"}]}],"member":"1968","published-online":{"date-parts":[[2024,6,21]]},"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/3\/27\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:02:21Z","timestamp":1760108541000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/3\/27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":0,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["cryptography8030027"],"URL":"https:\/\/doi.org\/10.3390\/cryptography8030027","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,21]]}}}