Articles with "identity authentication" as a keyword



Photo from wikipedia

Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals

Sign Up to like & get
recommendations!
Published in 2022 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-020-01706-0

Abstract: With the rapid development of machine-to-machine (M2M) mobile smart terminals, M2M services can be used in a wide range of industries, including such as tele-medicine, remote meter reading and public security. Since different industries and… read more here.

Keywords: identity authentication; machine; behavior; sequence ... See more keywords

Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing

Sign Up to like & get
recommendations!
Published in 2019 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-019-1378-6

Abstract: In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to… read more here.

Keywords: cross domain; cloud computing; group; authentication ... See more keywords

Quantum secret-sharing: single photon-based (t,n) threshold scheme with identity authentication

Sign Up to like & get
recommendations!
Published in 2025 at "Physica Scripta"

DOI: 10.1088/1402-4896/adff3a

Abstract: The (t,n) -threshold schemes offer significant advantages over n,n -threshold schemes due to their flexibility, fault tolerance, and practicality. In this paper, a (t,n) -threshold quantum secret-sharing (QSS) and quantum state sharing schemes based on… read more here.

Keywords: scheme; quantum secret; identity authentication; secret sharing ... See more keywords

Measurement-device-independent quantum dialogue protocol with bidirectional identity authentication

Sign Up to like & get
recommendations!
Published in 2025 at "Chinese Physics B"

DOI: 10.1088/1674-1056/addd81

Abstract: Quantum dialogue (QD) realizes the real-time secure bidirectional quantum communication. Measurement-device-independent (MDI) QD can resist all possible attacks focusing on the imperfect measurement devices and enhance QD’s practical security. However, in practical applications, any secure… read more here.

Keywords: protocol; identity authentication; measurement; communication ... See more keywords

Designing Anonymous Signature-Based Identity Authentication Scheme for Ocean Multilevel Transmission

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3390176

Abstract: With the rapid development of exploration in the ocean, identity authentication technologies have been applied in marine data transfer environments to address the challenges of security and privacy. However, sending data directly to the target… read more here.

Keywords: transmission; authentication; identity authentication; signature ... See more keywords

A Lightweight Cross-Domain Direct Identity Authentication Protocol for VANETs

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3438257

Abstract: With the rapid development of Internet of Things (IoT) technology and the growth of traffic demand, vehicular ad hoc networks (VANETs) will become a major component of intelligent transportation systems. However, identity authentication in VANETs… read more here.

Keywords: identity authentication; cross domain; authentication; domain ... See more keywords

BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2025.3602114

Abstract: Unmanned aerial vehicles (UAVs) are vulnerable to interception and attacks when operated remotely without a unified and efficient identity authentication. Meanwhile, the openness of wireless communication environments potentially leads to data leakage and system paralysis.… read more here.

Keywords: zero trust; authentication; wireless; identity authentication ... See more keywords

Employing Single Photons for Measurement-Device-Independent Quantum Secure Direct Communication With Identity Authentication

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2024.3354250

Abstract: Quantum secure direct communication (QSDC) enables secure message transmission without needing pre-shared keys. To enhance the practical reliability of QSDC systems, measurement-device-independent (MDI) protocols have emerged, providing robust security in real-world applications. Despite the advantages… read more here.

Keywords: quantum secure; identity authentication; identity; single photons ... See more keywords

Broadcast Authentication: An Efficient Identity Authentication Protocol With Provable Security for VANETs

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2025.3558837

Abstract: With the advancement of the Internet of Things (IOT), Vehicular Ad Hoc networks (VANETs) are integrated into intelligent transportation systems to facilitate vehicle communication. However, as the number of vehicles and application diversity increase, significant… read more here.

Keywords: authentication; identity authentication; communication; broadcast authentication ... See more keywords

A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2020.2964537

Abstract: Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity… read more here.

Keywords: blockchain based; authentication; identity authentication; blockchain ... See more keywords

A flexible pressure sensor array for self-powered identity authentication during typing

Sign Up to like & get
recommendations!
Published in 2025 at "Science Advances"

DOI: 10.1126/sciadv.ads2297

Abstract: The keyboard, a staple tool for information entry and human-machine interaction, faces demands for enhanced information security due to evolving internet technologies. This study introduces a self-powered flexible intelligent keyboard (SFIK) that harnesses the giant… read more here.

Keywords: identity authentication; self powered; flexible pressure;