Articles with "based authentication" as a keyword



Privacy preserving biometric authentication using Chaos on remote untrusted server

Sign Up to like & get
recommendations!
Published in 2021 at "Measurement"

DOI: 10.1016/j.measurement.2021.109257

Abstract: Abstract Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT)… read more here.

Keywords: authentication; privacy preserving; untrusted server; based authentication ... See more keywords

Pre-AttentiveGaze: gaze-based authentication dataset with momentary visual interactions

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Data"

DOI: 10.1038/s41597-025-04538-3

Abstract: This manuscript presents a Pre-AttentiveGaze dataset. One of the defining characteristics of gaze-based authentication is the necessity for a rapid response. In this study, we constructed a dataset for identifying individuals through eye movements by… read more here.

Keywords: pre attentivegaze; gaze based; based authentication; dataset ... See more keywords

A cooperative ECC-based authentication protocol for VANETs

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-24663-8

Abstract: Vehicular Ad Hoc Networks (VANETs) play a critical role in Intelligent Transportation Systems (ITSs), enabling secure communication between vehicles and roadside infrastructure. However, in dense traffic environments, conventional centralized Vehicle-to-Infrastructure (V2I) authentication schemes impose a… read more here.

Keywords: authentication; based authentication; authentication protocol; ecc based ... See more keywords

Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2826518

Abstract: The upcoming Fifth Generation (5G) networks can provide ultra-reliable ultra-low latency vehicle-to-everything for vehicular ad hoc networks (VANET) to promote road safety, traffic management, information dissemination, and automatic driving for drivers and passengers. However, 5G-VANET… read more here.

Keywords: based authentication; authentication; pseudonymous authentication; dos attacks ... See more keywords

A Novel Moving Target Defense Scheme With Physical Unclonable Functions-Based Authentication

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3154012

Abstract: Recent studies have discovered possible security issues on Supervisory Control and Data Acquisition systems (SCADA) in the critical architecture and focus on developing protection mechanisms on this system. Moving Target Mobile IPv6 Defense II is… read more here.

Keywords: moving target; scheme; based authentication; security ... See more keywords

A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204271

Abstract: Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has miserable significance in many areas, including wildlife monitoring,… read more here.

Keywords: authentication; authentication scheme; verifiably secure; scheme ... See more keywords

A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3232301

Abstract: Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to… read more here.

Keywords: authentication scheme; illegal signatures; scheme; verification ... See more keywords

Jitter-Based Authentication for Automotive Wireline Networks

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2023.3347541

Abstract: This paper proposes a new authentication approach targeted to wireline broadcast communication systems for automotive and industrial applications. The proposed approach leverages jitter amplification in wireline channels, that become stronger features for message-source authentication with… read more here.

Keywords: authentication; based authentication; authentication automotive; wireline ... See more keywords

Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir’s Secret Sharing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3065836

Abstract: Physical unclonable function (PUF) has emerged as an attractive hardware primitive for lightweight authentication in the Internet of Things (IoT). However, strong-PUF-based authentication schemes are threatened by powerful machine learning attacks. Therefore, dedicated lightweight protocols… read more here.

Keywords: authentication; strong puf; puf based; protocol ... See more keywords

On the Security of an ECC-Based Authentication Scheme for Internet of Drones

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2022.3162604

Abstract: We demonstrate that the ECC-based authentication scheme for internet of drones (short for IoD-AS, published in IEEE Systems Journal, Hussain et al., 2021) Amassing the security: An ECC-based authentication scheme for Internet of Drones) fails… read more here.

Keywords: authentication scheme; scheme internet; internet drones; ecc based ... See more keywords

CurIAs: Current-Based IC Authentication by Exploiting Supply Current Variations

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2022.3158075

Abstract: Physical unclonable functions (PUFs) have emerged as one of the most notable hardware primitives to mitigate the ever-growing global issue of counterfeiting and cloning of integrated circuits (ICs) in recent times. PUFs exploit the intrinsic… read more here.

Keywords: supply; current based; supply current; curias current ... See more keywords