We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. L3AM: Linear Adaptive Additive Angular Margin Loss for Video-Based Hand Gesture Authentication

    Feature extractors significantly impact the performance of biometric systems. In the field of hand gesture authentication, existing studies focus on...

    Wenwei Song, Wenxiong Kang, ... Yitao Qiao in International Journal of Computer Vision
    Article 06 May 2024
  2. Dynamic authentication for intelligent sensor clouds in the Internet of Things

    Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and...

    Hussain Al-Aqrabi, Ahmed M. Manasrah, ... Hoda Alkhzaimi in International Journal of Information Security
    Article 13 March 2024
  3. Provable secure authentication key agreement for wireless body area networks

    Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...

    Yuqian Ma, Wenbo Shi, ... Qingfeng Cheng in Frontiers of Computer Science
    Article 23 December 2023
  4. Challenges and Future Directions in the Implementation of Quantum Authentication Protocols

    Quantum computing is a powerful concept in the technological world that is critically valued in information security due to its enhanced computation...
    Juliet McLeod, Ritajit Majumdar, Sanchari Das in Computational Science – ICCS 2022
    Conference paper 2022
  5. A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

    Abstract

    With the increased number of smart devices in IoT and cloud, communication messages are exchanged extensively throughout the network. This...

    Anuj Kumar Singh, Anand Nayyar, Ankit Garg in Multimedia Tools and Applications
    Article 23 November 2022
  6. A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system

    Telecare Medicine Information System (TMIS) provides patient’s efficient and convenient e-healthcare services where the patient private health...

    Ashish Kamble, Vishesh Gaikwad, Jitendra Tembhurne in International Journal of Information Technology
    Article 24 June 2023
  7. Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks

    Healthcare systems promise a significant impact in the field of quality of life. However, security is one of the hottest topics that must be...

    Meysam Ghahramani, Reza Javidan in Journal of Computer Virology and Hacking Techniques
    Article 09 September 2022
  8. ECG-based authentication systems: a comprehensive and systematic review

    In recent years, security systems based on biometric features have become a promising solution to identify humans, and it is preferred over...

    Shiva Asadianfam, Mohammad Javad Talebi, Elaheh Nikougoftar in Multimedia Tools and Applications
    Article 23 August 2023
  9. Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker

    Advancements in computing and communication technology have increased the number of devices connected to the Internet, leading to the emergence of...

    Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan in The Journal of Supercomputing
    Article 01 December 2023
  10. Impact of Consensus Protocols on the Efficiency of Registration and Authentication Process in Self-sovereign Identity

    Self-Sovereign Identity (SSI), allows each entity to control its identities with minimal data disclosure to ensure privacy, through its concepts of...
    Conference paper 2023
  11. A secure blockchain-assisted authentication framework for electronic health records

    The evolution of internet technology has significantly broadened the accessibility of E-healthcare services, with Electronic Healthcare Records (EHR)...

    Vipin Kumar, Rifaqat Ali, Pawan Kumar Sharma in International Journal of Information Technology
    Article 08 February 2024
  12. A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography

    Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical...

    Yulei Chen, Jianhua Chen in Multimedia Tools and Applications
    Article 12 October 2022
  13. BSAS: blockchain-based shareable authentication scheme for smart healthcare

    Nowadays, research efforts are strongly directed toward integrating Blockchain into Smart Healthcare Systems to achieve distribution, transparency,...

    Divya Rani, Sachin Tripathi, Ashish Tomar in Cluster Computing
    Article 04 April 2024
  14. A dynamic C-V2X anonymous authentication and group key agreement protocol

    At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named...

    Beibei Cui, Wei He, Yan Cui in International Journal of Information Security
    Article 18 June 2024
  15. Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

    In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...

    Purvi Tandel, Jitendra Nasriwala in Service Oriented Computing and Applications
    Article 14 June 2024
  16. Password based authentication for web based graphics computing services retrieval in cloud

    In the global environment privacy and security issues were critical to handle the huge number of participants. Many security-based research works...

    Eman S. Alkhalifah in Multimedia Tools and Applications
    Article 19 April 2024
  17. Blockchain-assisted secure message authentication with reputation management for VANETs

    Message authentication is of great significance for secure information sharing in vehicular ad hoc networks. Due to the lack of verification of...

    Hongzhi Li, Dezhi Han in The Journal of Supercomputing
    Article 05 June 2023
  18. A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks

    The wireless body area network (WBAN) has emerged as a promising networking paradigm thanks to embedded systems, integrated circuit technologies, and...

    Sunil Prajapat, Pankaj Kumar, Sandeep Kumar in Cluster Computing
    Article 14 April 2024
  19. TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor

    Security vulnerabilities associated with Internet of Medical Things (IoMT) may lead to health disasters. The researchers already have designed...

    Namrata Singh, Ayan Kumar Das in The Journal of Supercomputing
    Article 04 July 2023
  20. Stronger Authentication

    Different methods of authentication are not considered equal. The static passwords that still enable access to many Internet services are considered...
    Yvonne Wilson, Abhishek Hingnikar in Solving Identity Management in Modern Applications
    Chapter 2023
Did you find what you were looking for? Share feedback.