Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Soft Computing"
DOI: 10.1007/s00500-016-2440-3
Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not…
read more here.
Keywords:
key authentication;
authentication scheme;
authentication;
public key ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Personal and Ubiquitous Computing"
DOI: 10.1007/s00779-021-01592-7
Abstract: Wireless sensor networks (WSNs) are applicable in numerous fields ranging from very common to those demanding critical security concerns. It is recommended to provide external users a direct access to the data from sensors as…
read more here.
Keywords:
wireless sensor;
scheme;
authentication;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-4302-4
Abstract: In real-life applications, ensuring secure transmission of data over public network channels to prevent malicious eavesdropping of the data is an important issue. Several potential security risks arise while protecting data and providing access control…
read more here.
Keywords:
authentication scheme;
authentication;
security;
scheme ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-017-0460-1
Abstract: The session initiation protocol (SIP) is a signaling protocol which is used to controlling communication in the Internet. It is also used for initiating, terminating and maintaining the sessions. A strong authentication scheme plays a…
read more here.
Keywords:
authentication scheme;
session initiation;
authentication;
scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-02349-5
Abstract: In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372 ) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a user and a smart…
read more here.
Keywords:
ilas iot;
improved lightweight;
scheme;
lightweight authentication ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-019-03752-7
Abstract: Internet of Things (IoT) is known as a hot topic in current decade. As a widely accepted IoT technology, wireless sensor network (WSN) is employed in fire alarming, agriculture, etc. However, how to devise a…
read more here.
Keywords:
multi gateway;
authentication;
authentication scheme;
sensor ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Reliable Intelligent Environments"
DOI: 10.1007/s40860-019-00079-w
Abstract: In a modern healthcare environment, the adoption of mobile health care technology is promising to enhance the quality of patient monitoring of chronically ill as well as elderly and healthy individuals for quick intervention at…
read more here.
Keywords:
authentication scheme;
healthcare environment;
scheme;
environment ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Chinese Journal of Electronics"
DOI: 10.1049/cje.2017.10.002
Abstract: Cloud computing provides users with a great deal of flexibility and convenience. However, cloud computing also brings very serious security problems, especially for enterprise data security stored in the cloud. Once the data is outsourced…
read more here.
Keywords:
cloud;
privacy;
cloud computing;
authentication scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Connection Science"
DOI: 10.1080/09540091.2021.1889976
Abstract: ABSTRACT The rapid development of information technology promotes the development and application of Telecare Information System (TMIS). However, TMIS also has security problems such as information leakage, false authentication, and key loss. In order to…
read more here.
Keywords:
telecare;
authentication;
information system;
authentication scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2841972
Abstract: Many smart healthcare applications are adopting cloud to provide services to patients. However, the sensitive data can be disclosed to the authentication server/service provider. Therefore, security and privacy are crucial to its success and deployment…
read more here.
Keywords:
healthcare applications;
authentication scheme;
authentication;
anonymous authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2880984
Abstract: Traffic accidents frequently occur due to the mistakes of drivers, and many people are injured or lose their lives in this way. However, with the increasing use of Internet of Things in real applications, vehicle…
read more here.
Keywords:
authentication scheme;
updated information;
authentication;
scheme ... See more keywords