Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-020-01706-0
Abstract: With the rapid development of machine-to-machine (M2M) mobile smart terminals, M2M services can be used in a wide range of industries, including such as tele-medicine, remote meter reading and public security. Since different industries and…
read more here.
Keywords:
identity authentication;
machine;
behavior;
sequence ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Wuhan University Journal of Natural Sciences"
DOI: 10.1007/s11859-019-1378-6
Abstract: In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to…
read more here.
Keywords:
cross domain;
cloud computing;
group;
authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Physica Scripta"
DOI: 10.1088/1402-4896/adff3a
Abstract: The (t,n) -threshold schemes offer significant advantages over n,n -threshold schemes due to their flexibility, fault tolerance, and practicality. In this paper, a (t,n) -threshold quantum secret-sharing (QSS) and quantum state sharing schemes based on…
read more here.
Keywords:
scheme;
quantum secret;
identity authentication;
secret sharing ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Chinese Physics B"
DOI: 10.1088/1674-1056/addd81
Abstract: Quantum dialogue (QD) realizes the real-time secure bidirectional quantum communication. Measurement-device-independent (MDI) QD can resist all possible attacks focusing on the imperfect measurement devices and enhance QD’s practical security. However, in practical applications, any secure…
read more here.
Keywords:
protocol;
identity authentication;
measurement;
communication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2024.3390176
Abstract: With the rapid development of exploration in the ocean, identity authentication technologies have been applied in marine data transfer environments to address the challenges of security and privacy. However, sending data directly to the target…
read more here.
Keywords:
transmission;
authentication;
identity authentication;
signature ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2024.3438257
Abstract: With the rapid development of Internet of Things (IoT) technology and the growth of traffic demand, vehicular ad hoc networks (VANETs) will become a major component of intelligent transportation systems. However, identity authentication in VANETs…
read more here.
Keywords:
identity authentication;
cross domain;
authentication;
domain ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2025.3602114
Abstract: Unmanned aerial vehicles (UAVs) are vulnerable to interception and attacks when operated remotely without a unified and efficient identity authentication. Meanwhile, the openness of wireless communication environments potentially leads to data leakage and system paralysis.…
read more here.
Keywords:
zero trust;
authentication;
wireless;
identity authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2024.3354250
Abstract: Quantum secure direct communication (QSDC) enables secure message transmission without needing pre-shared keys. To enhance the practical reliability of QSDC systems, measurement-device-independent (MDI) protocols have emerged, providing robust security in real-world applications. Despite the advantages…
read more here.
Keywords:
quantum secure;
identity authentication;
identity;
single photons ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2025.3558837
Abstract: With the advancement of the Internet of Things (IOT), Vehicular Ad Hoc networks (VANETs) are integrated into intelligent transportation systems to facilitate vehicle communication. However, as the number of vehicles and application diversity increase, significant…
read more here.
Keywords:
authentication;
identity authentication;
communication;
broadcast authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2020.2964537
Abstract: Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity…
read more here.
Keywords:
blockchain based;
authentication;
identity authentication;
blockchain ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Science Advances"
DOI: 10.1126/sciadv.ads2297
Abstract: The keyboard, a staple tool for information entry and human-machine interaction, faces demands for enhanced information security due to evolving internet technologies. This study introduces a self-powered flexible intelligent keyboard (SFIK) that harnesses the giant…
read more here.
Keywords:
identity authentication;
self powered;
flexible pressure;