Articles with "identity authentication" as a keyword



Photo from wikipedia

Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals

Sign Up to like & get
recommendations!
Published in 2022 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-020-01706-0

Abstract: With the rapid development of machine-to-machine (M2M) mobile smart terminals, M2M services can be used in a wide range of industries, including such as tele-medicine, remote meter reading and public security. Since different industries and… read more here.

Keywords: identity authentication; machine; behavior; sequence ... See more keywords
Photo by lukaszlada from unsplash

Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing

Sign Up to like & get
recommendations!
Published in 2019 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-019-1378-6

Abstract: In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to… read more here.

Keywords: cross domain; cloud computing; group; authentication ... See more keywords

A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2020.2964537

Abstract: Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity… read more here.

Keywords: blockchain based; authentication; identity authentication; blockchain ... See more keywords
Photo from wikipedia

Internet of Things Device Identification Algorithm considering User Privacy

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/6173185

Abstract: The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology… read more here.

Keywords: identification; user privacy; identity authentication; privacy ... See more keywords
Photo by onurbinay from unsplash

A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0265937

Abstract: As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS… read more here.

Keywords: system; security; identity authentication; scheme ... See more keywords
Photo by adigold1 from unsplash

A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24040483

Abstract: To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger… read more here.

Keywords: identity; third party; identity authentication; new quantum ... See more keywords
Photo by krakenimages from unsplash

A Kind of (t, n) Threshold Quantum Secret Sharing with Identity Authentication

Sign Up to like & get
recommendations!
Published in 2023 at "Entropy"

DOI: 10.3390/e25050827

Abstract: Quantum secret sharing (QSS) is an important branch of quantum cryptography. Identity authentication is a significant means to achieve information protection, which can effectively confirm the identity information of both communication parties. Due to the… read more here.

Keywords: secret sharing; quantum secret; identity; identity authentication ... See more keywords