Sign Up to like & get
recommendations!
0
Published in 2021 at "Measurement"
DOI: 10.1016/j.measurement.2021.109257
Abstract: Abstract Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT)…
read more here.
Keywords:
authentication;
privacy preserving;
untrusted server;
based authentication ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2826518
Abstract: The upcoming Fifth Generation (5G) networks can provide ultra-reliable ultra-low latency vehicle-to-everything for vehicular ad hoc networks (VANET) to promote road safety, traffic management, information dissemination, and automatic driving for drivers and passengers. However, 5G-VANET…
read more here.
Keywords:
based authentication;
authentication;
pseudonymous authentication;
dos attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3154012
Abstract: Recent studies have discovered possible security issues on Supervisory Control and Data Acquisition systems (SCADA) in the critical architecture and focus on developing protection mechanisms on this system. Moving Target Mobile IPv6 Defense II is…
read more here.
Keywords:
moving target;
scheme;
based authentication;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204271
Abstract: Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has miserable significance in many areas, including wildlife monitoring,…
read more here.
Keywords:
authentication;
authentication scheme;
verifiably secure;
scheme ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3232301
Abstract: Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to…
read more here.
Keywords:
authentication scheme;
illegal signatures;
scheme;
verification ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3065836
Abstract: Physical unclonable function (PUF) has emerged as an attractive hardware primitive for lightweight authentication in the Internet of Things (IoT). However, strong-PUF-based authentication schemes are threatened by powerful machine learning attacks. Therefore, dedicated lightweight protocols…
read more here.
Keywords:
authentication;
strong puf;
puf based;
protocol ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2022.3162604
Abstract: We demonstrate that the ECC-based authentication scheme for internet of drones (short for IoD-AS, published in IEEE Systems Journal, Hussain et al., 2021) Amassing the security: An ECC-based authentication scheme for Internet of Drones) fails…
read more here.
Keywords:
authentication scheme;
scheme internet;
internet drones;
ecc based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2023 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3158075
Abstract: Physical unclonable functions (PUFs) have emerged as one of the most notable hardware primitives to mitigate the ever-growing global issue of counterfeiting and cloning of integrated circuits (ICs) in recent times. PUFs exploit the intrinsic…
read more here.
Keywords:
supply;
current based;
supply current;
curias current ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2023.3242291
Abstract: The fully dynamic dense environment of the Internet of Vehicles (IoV) and conditions like high traffic jams, collisions, and uneven road conditions increase the communication messages. Consequently, the computation and communication costs of the IoV…
read more here.
Keywords:
mac based;
security;
scheme;
internet vehicles ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/1550147719841003
Abstract: One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered…
read more here.
Keywords:
based authentication;
type communications;
authentication key;
authentication ... See more keywords