Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-020-01706-0
Abstract: With the rapid development of machine-to-machine (M2M) mobile smart terminals, M2M services can be used in a wide range of industries, including such as tele-medicine, remote meter reading and public security. Since different industries and…
read more here.
Keywords:
identity authentication;
machine;
behavior;
sequence ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Wuhan University Journal of Natural Sciences"
DOI: 10.1007/s11859-019-1378-6
Abstract: In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to…
read more here.
Keywords:
cross domain;
cloud computing;
group;
authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2020.2964537
Abstract: Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity…
read more here.
Keywords:
blockchain based;
authentication;
identity authentication;
blockchain ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Computational Intelligence and Neuroscience"
DOI: 10.1155/2022/6173185
Abstract: The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology…
read more here.
Keywords:
identification;
user privacy;
identity authentication;
privacy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "PLoS ONE"
DOI: 10.1371/journal.pone.0265937
Abstract: As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS…
read more here.
Keywords:
system;
security;
identity authentication;
scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24040483
Abstract: To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger…
read more here.
Keywords:
identity;
third party;
identity authentication;
new quantum ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Entropy"
DOI: 10.3390/e25050827
Abstract: Quantum secret sharing (QSS) is an important branch of quantum cryptography. Identity authentication is a significant means to achieve information protection, which can effectively confirm the identity information of both communication parties. Due to the…
read more here.
Keywords:
secret sharing;
quantum secret;
identity;
identity authentication ... See more keywords