Sign Up to like & get
recommendations!
0
Published in 2021 at "Measurement"
DOI: 10.1016/j.measurement.2021.109257
Abstract: Abstract Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT)…
read more here.
Keywords:
authentication;
privacy preserving;
untrusted server;
based authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Data"
DOI: 10.1038/s41597-025-04538-3
Abstract: This manuscript presents a Pre-AttentiveGaze dataset. One of the defining characteristics of gaze-based authentication is the necessity for a rapid response. In this study, we constructed a dataset for identifying individuals through eye movements by…
read more here.
Keywords:
pre attentivegaze;
gaze based;
based authentication;
dataset ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-025-24663-8
Abstract: Vehicular Ad Hoc Networks (VANETs) play a critical role in Intelligent Transportation Systems (ITSs), enabling secure communication between vehicles and roadside infrastructure. However, in dense traffic environments, conventional centralized Vehicle-to-Infrastructure (V2I) authentication schemes impose a…
read more here.
Keywords:
authentication;
based authentication;
authentication protocol;
ecc based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2826518
Abstract: The upcoming Fifth Generation (5G) networks can provide ultra-reliable ultra-low latency vehicle-to-everything for vehicular ad hoc networks (VANET) to promote road safety, traffic management, information dissemination, and automatic driving for drivers and passengers. However, 5G-VANET…
read more here.
Keywords:
based authentication;
authentication;
pseudonymous authentication;
dos attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3154012
Abstract: Recent studies have discovered possible security issues on Supervisory Control and Data Acquisition systems (SCADA) in the critical architecture and focus on developing protection mechanisms on this system. Moving Target Mobile IPv6 Defense II is…
read more here.
Keywords:
moving target;
scheme;
based authentication;
security ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204271
Abstract: Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has miserable significance in many areas, including wildlife monitoring,…
read more here.
Keywords:
authentication;
authentication scheme;
verifiably secure;
scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3232301
Abstract: Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to…
read more here.
Keywords:
authentication scheme;
illegal signatures;
scheme;
verification ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2023.3347541
Abstract: This paper proposes a new authentication approach targeted to wireline broadcast communication systems for automotive and industrial applications. The proposed approach leverages jitter amplification in wireline channels, that become stronger features for message-source authentication with…
read more here.
Keywords:
authentication;
based authentication;
authentication automotive;
wireline ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3065836
Abstract: Physical unclonable function (PUF) has emerged as an attractive hardware primitive for lightweight authentication in the Internet of Things (IoT). However, strong-PUF-based authentication schemes are threatened by powerful machine learning attacks. Therefore, dedicated lightweight protocols…
read more here.
Keywords:
authentication;
strong puf;
puf based;
protocol ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2022.3162604
Abstract: We demonstrate that the ECC-based authentication scheme for internet of drones (short for IoD-AS, published in IEEE Systems Journal, Hussain et al., 2021) Amassing the security: An ECC-based authentication scheme for Internet of Drones) fails…
read more here.
Keywords:
authentication scheme;
scheme internet;
internet drones;
ecc based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3158075
Abstract: Physical unclonable functions (PUFs) have emerged as one of the most notable hardware primitives to mitigate the ever-growing global issue of counterfeiting and cloning of integrated circuits (ICs) in recent times. PUFs exploit the intrinsic…
read more here.
Keywords:
supply;
current based;
supply current;
curias current ... See more keywords