Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Food chemistry"
DOI: 10.1016/j.foodchem.2018.10.140
Abstract: Gas chromatography-combustion-isotope ratio mass spectrometry (GC-C-IRMS) for the analysis of key volatile compounds sampled using headspace solid phase microextraction (HS-SPME) is an appropriate tool for authenticity assessment of apple aromas. The current research characterises 18…
read more here.
Keywords:
compounds apple;
isotope;
authentication key;
aroma compounds ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Sustainable Cities and Society"
DOI: 10.1016/j.scs.2020.102416
Abstract: Abstract Internet of Things (IoT) utilizes an intelligent technique to facilitate the design and development of smart-urban projects. As the smart devices have limited battery sources, IoT services should initiate its setup with low-power consumption.…
read more here.
Keywords:
iot;
smart iot;
authentication key;
mobile sink ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Connection Science"
DOI: 10.1080/09540091.2022.2032602
Abstract: The Internet of Vehicles is deployed in an open environment, and protecting its security and data privacy is the challenge. Carrying out the Internet of Vehicles secure authentication before interaction of information is an important…
read more here.
Keywords:
authentication;
authentication key;
security;
scheme ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3142084
Abstract: Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key…
read more here.
Keywords:
smart grids;
authentication key;
puf based;
key agreement ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3198858
Abstract: In the above article, Zhang et al. (2021) proposed a many-to-many authentication and key agreement scheme named SMAKA for secure authentication and key agreement between multiple vehicles and cloud service providers (CSPs) in a vehicular…
read more here.
Keywords:
authentication;
authentication key;
security;
scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2018.2817028
Abstract: Growing popularity of multimedia applications, pervasive connectivity, higher bandwidth, and euphoric technology penetration among bulk of the human race that happens to be cellular technology users, has fueled the adaptation to long-term evolution (LTE)/system architecture…
read more here.
Keywords:
authentication key;
console grid;
key agreement;
authentication ... See more keywords
Sign Up to like & get
recommendations!
4
Published in 2023 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3191319
Abstract: Advanced metering infrastructure (AMI) is a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication and key agreement (AKA) protocol is needed for AMI systems to ensure the…
read more here.
Keywords:
metering infrastructure;
authentication key;
smart grid;
advanced metering ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2021.3099488
Abstract: The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance driving experience…
read more here.
Keywords:
authentication;
key exchange;
enabled vanets;
authentication key ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/1550147718754793
Abstract: As an industrial communication data interaction specification, OPC Unified Architecture effectively solves the industrial Internet of Things system integration problem. This article designs an authentication and key agreement scheme based on implicit certificate using the…
read more here.
Keywords:
authentication key;
industrial internet;
unified architecture;
internet things ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/1550147719841003
Abstract: One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered…
read more here.
Keywords:
based authentication;
type communications;
authentication key;
authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "PLoS ONE"
DOI: 10.1371/journal.pone.0271817
Abstract: The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is…
read more here.
Keywords:
agreement;
mutual authentication;
authentication key;
protocol ... See more keywords