Articles with "aware authentication" as a keyword



Photo by drew_hays from unsplash

A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3181609

Abstract: Benefiting from the progress of Internet of Things (IoT) technology, medical devices, wearables, sensors, and users can be connected with each other to form an Internet of Medical Things (IoMT) ecosystem. IoMT improves efficiency, increases… read more here.

Keywords: authentication; medical things; privacy aware; aware authentication ... See more keywords
Photo from wikipedia

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2016.2574719

Abstract: Recently, Tsai and Lo proposed a privacy aware authentication scheme for distributed mobile cloud computing services. It is claimed that the scheme achieves mutual authentication and withstands all major security threats. However, we first identify… read more here.

Keywords: privacy aware; authentication scheme; scheme distributed; aware authentication ... See more keywords