Articles with "anonymous authentication" as a keyword



Photo by camstejim from unsplash

Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2841972

Abstract: Many smart healthcare applications are adopting cloud to provide services to patients. However, the sensitive data can be disclosed to the authentication server/service provider. Therefore, security and privacy are crucial to its success and deployment… read more here.

Keywords: healthcare applications; authentication scheme; authentication; anonymous authentication ... See more keywords
Photo from wikipedia

An Improved Anonymous Authentication Protocol for Location-Based Service

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2930740

Abstract: The authentication protocols are implemented to provide identity authentication for communication entities. With the increasing demand of network security and the development of technology, the anonymous authentication protocol for LBS (location based service) has gradually… read more here.

Keywords: anonymous authentication; authentication protocol; authentication; protocol ... See more keywords
Photo from wikipedia

AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2997840

Abstract: As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to communicate with each other via opportunistic wireless links. In order to protect privacy of drivers, vehicles registered in VANETs are required to authenticate and… read more here.

Keywords: group signature; scheme; anonymous authentication; authentication scheme ... See more keywords
Photo by ramaissance from unsplash

Efficient Anonymous Authentication for Wireless Body Area Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3180165

Abstract: Advances in integrated circuit and wireless communication technologies are making wireless body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, and processing real-time physical parameters, WBANs assist clients in better recognizing and… read more here.

Keywords: authentication; anonymous authentication; wireless body; area networks ... See more keywords
Photo by dtopkin1 from unsplash

Blockchain-Based Physically Secure and Privacy-Aware Anonymous Authentication Scheme for Fog-Based Vanets

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2022.3230448

Abstract: Vehicular Ad-hoc Networks (VANETs) have a lot of potential for improving traffic management and driver safety. However, employing a wireless channel for vehicle communication has security and privacy concerns such as authentication, confidentiality, integrity, access… read more here.

Keywords: anonymous authentication; blockchain based; privacy; security ... See more keywords
Photo by ldxcreative from unsplash

An Improved Identity-Based Anonymous Authentication Scheme Resistant to Semi-Trusted Server Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3203991

Abstract: In mobile edge computing, the computing tasks of IoT terminal devices with limited computing power often need to be offloaded to servers for processing. However, there are malicious attacks by adversaries and malicious behaviors of… read more here.

Keywords: authentication scheme; anonymous authentication; identity based; security ... See more keywords
Photo from wikipedia

SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Green Communications and Networking"

DOI: 10.1109/tgcn.2021.3126618

Abstract: An automatic identification system (AIS) provides significant improvements in traffic monitoring, collision avoidance, and ship assistance. A unique Maritime Mobile Service Identity (MMSI) is used by the AIS transceiver to identify the specific ship. However,… read more here.

Keywords: anonymous authentication; authentication trajectory; traffic; trajectory privacy ... See more keywords
Photo from wikipedia

Lightweight Privacy and Confidentiality Preserving Anonymous Authentication Scheme for WBANs

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3097759

Abstract: The recent developments in the wireless body area networks (WBAN) play a vital role in the modern remote healthcare monitoring system. In WBAN, the deployed intelligent, resource-limited body sensors will collect the patients' biological information… read more here.

Keywords: authentication scheme; anonymous authentication; security; preserving anonymous ... See more keywords
Photo from wikipedia

A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3226244

Abstract: Intelligent Transport Systems (ITS) have received growing attention recently driven by technical advances in Industrial Internet of Vehicles (IIoV). In IIoV, vehicles report traffic data to management infrastructures to achieve better ITS services. To ensure… read more here.

Keywords: authentication; anonymous authentication; data reporting; intelligent transport ... See more keywords