We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Ensemble recognition model with optimal training for multimodal biometric authentication

    Biometric security methods deploy any type of biometric recognition for safety purposes. Different from unimodal biometric system that uses single...

    K. Pavan Kumar, P. E. S. N. Krishna Prasad, ... M. Jogendra Kumar in Multimedia Tools and Applications
    Article 08 March 2024
  2. Cryptography with optimal deep learning-based authentication scheme for preserving anonymity in telecare medical information system

    The Telecare Medicine Information System (TMIS) revolutionizes healthcare delivery by integrating medical equipment and sensors, facilitating...

    Syed Amma Sheik, Saleem Durai in Multimedia Tools and Applications
    Article 30 April 2024
  3. Authentication Protocols and Key Establishment

    This chapter discusses authentication protocols involving cryptographic algorithms. The main focus is authenticated key establishment protocols...
    Paul C. van Oorschot in Computer Security and the Internet
    Chapter 2021
  4. SUACC-IoT: secure unified authentication and access control system based on capability for IoT

    With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security...

    N. Sivaselvan, K. Vivekananda Bhat, ... Joel J. P. C. Rodrigues in Cluster Computing
    Article Open access 16 September 2022
  5. Security of lightweight mutual authentication protocols

    Sensors and IoT (Internet of Things), which include RFID (Radio-Frequency IDentification) tags, have witnessed widespread adoption across a wide...

    Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu in The Journal of Supercomputing
    Article 15 October 2020
  6. Towards serverless fast one round authentication with two mobile end devices

    We newly present a f ast o ne-round a uthentication protocol between two IoT m obile end devices ( FOAM ). Our FOAM is based on a practical authentication...

    Article 25 October 2022
  7. Blockchain enabled zero trust based authentication scheme for railway communication networks

    With the introduction of emerging technologies such as cloud computing, the railway communication network has the characteristics of complex...

    Yuan Feng, Zhangdui Zhong, ... Yongsheng Zhu in Journal of Cloud Computing
    Article Open access 24 April 2023
  8. TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments

    A mechanism of fog computing environment is employed in order to enhance the cloud computing services toward the edge devices in a range of locations...

    Naveen Chandra Gowda, Sunilkumar S. Manvi, ... Rajkumar Buyya in The Journal of Supercomputing
    Article 30 October 2023
  9. Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography

    Abstract

    An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor...

    Article 01 December 2023
  10. Enhancing security of biometrics based authentication framework for DRM system

    Due to current advancements in digital and Internet technologies, digital content theft has grown to a significant degree. Digital rights management...

    Purva Rewal, Dheerendra Mishra, ... Saurab Rana in Multimedia Tools and Applications
    Article 03 April 2023
  11. An efficient mCK signing and mobile based identity solution for authentication

    With the growing spread of mobile devices, many services are accessed using such devices and hence there is a need to have an authentication...

    Kapil Kant Kamal, Sunil Gupta, ... Monit Kapoor in International Journal of Information Technology
    Article 05 March 2023
  12. Blockchain-based mutual authentication protocol without CA

    Nowadays, most of the federation chain identity authentication adopts the certificate authentication of CA (Certification Authority) under PKI...

    Yue Li, Mingcheng Xu, Gaojian Xu in The Journal of Supercomputing
    Article 17 May 2022
  13. Use of hybrid post-quantum key exchange in internet protocols

    This article describes the current situation with incorporating hybrid post-quantum key exchange into the internet security protocols taking TLS 1.3...

    Article 16 March 2024
  14. AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

    The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and...

    Fatty M. Salem, Maha Safwat, ... Shahira Habashy in Journal of Cloud Computing
    Article Open access 30 August 2023
  15. A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network

    Vehicular ad hoc network (VANET) has become an indispensable requirement in smart cities. The major applications are acquiring traffic information,...

    Pankaj Kumar, Hari Om in The Journal of Supercomputing
    Article 22 May 2022
  16. Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

    Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it...
    Lin Li, Chao Chen, ... Yang **ang in Computer Security – ESORICS 2023
    Conference paper 2024
  17. A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding

    The image may be maliciously tampered when transmitted on the shared platform, and the receiver cannot determine whether the received image is a true...

    Nana Ren, Guihua Cheng, ... Boyu Li in Multimedia Tools and Applications
    Article 16 September 2023
  18. Blockchain assisted AHMFA authentication in employee performance assessment system

    The concept of blockchain has attained more attention recently to promote secured encryption and decryption, especially in industrial explorations...

    R. Vignesh, K. Mohana Prasad in Multimedia Tools and Applications
    Article 30 May 2023
  19. A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation

    In Healthcare 4.0, Wireless Body Area Networks (WBAN) takes place a major role in gathering real-time data of patients. The gathered real-time...

    Arun Sekar Rajasekaran, M. Azees in International Journal of Information Security
    Article 29 June 2023
  20. Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network

    In this paper, we have proposed a lightweight mutual authentication and key agreement scheme for 5G (5GMAKA) using the symmetric-key cryptographic...

    Sudip Kumar Palit, Mohuya Chakraborty, Subhalaxmi Chakraborty in The Journal of Supercomputing
    Article 15 September 2022
Did you find what you were looking for? Share feedback.