Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2841972
Abstract: Many smart healthcare applications are adopting cloud to provide services to patients. However, the sensitive data can be disclosed to the authentication server/service provider. Therefore, security and privacy are crucial to its success and deployment…
read more here.
Keywords:
healthcare applications;
authentication scheme;
authentication;
anonymous authentication ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2930740
Abstract: The authentication protocols are implemented to provide identity authentication for communication entities. With the increasing demand of network security and the development of technology, the anonymous authentication protocol for LBS (location based service) has gradually…
read more here.
Keywords:
anonymous authentication;
authentication protocol;
authentication;
protocol ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2997840
Abstract: As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to communicate with each other via opportunistic wireless links. In order to protect privacy of drivers, vehicles registered in VANETs are required to authenticate and…
read more here.
Keywords:
group signature;
scheme;
anonymous authentication;
authentication scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3180165
Abstract: Advances in integrated circuit and wireless communication technologies are making wireless body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, and processing real-time physical parameters, WBANs assist clients in better recognizing and…
read more here.
Keywords:
authentication;
anonymous authentication;
wireless body;
area networks ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2022.3230448
Abstract: Vehicular Ad-hoc Networks (VANETs) have a lot of potential for improving traffic management and driver safety. However, employing a wireless channel for vehicle communication has security and privacy concerns such as authentication, confidentiality, integrity, access…
read more here.
Keywords:
anonymous authentication;
blockchain based;
privacy;
security ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3203991
Abstract: In mobile edge computing, the computing tasks of IoT terminal devices with limited computing power often need to be offloaded to servers for processing. However, there are malicious attacks by adversaries and malicious behaviors of…
read more here.
Keywords:
authentication scheme;
anonymous authentication;
identity based;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Green Communications and Networking"
DOI: 10.1109/tgcn.2021.3126618
Abstract: An automatic identification system (AIS) provides significant improvements in traffic monitoring, collision avoidance, and ship assistance. A unique Maritime Mobile Service Identity (MMSI) is used by the AIS transceiver to identify the specific ship. However,…
read more here.
Keywords:
anonymous authentication;
authentication trajectory;
traffic;
trajectory privacy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2021.3097759
Abstract: The recent developments in the wireless body area networks (WBAN) play a vital role in the modern remote healthcare monitoring system. In WBAN, the deployed intelligent, resource-limited body sensors will collect the patients' biological information…
read more here.
Keywords:
authentication scheme;
anonymous authentication;
security;
preserving anonymous ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3226244
Abstract: Intelligent Transport Systems (ITS) have received growing attention recently driven by technical advances in Industrial Internet of Vehicles (IIoV). In IIoV, vehicles report traffic data to management infrastructures to achieve better ITS services. To ensure…
read more here.
Keywords:
authentication;
anonymous authentication;
data reporting;
intelligent transport ... See more keywords