Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology

    With the proliferation of Internet of Things (IoT) and its influence in various use case scenarios, it can be expected that IoT services will create a global reach. Smart cities, smart grids, smart industries,...

    Syeda Mariam Muzammal, Raja Kumar Murugesan in Advances in Cyber Security (2020)

  2. No Access

    Article

    Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices

    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligator...

    Syeda Mariam Muzammal, Munam Ali Shah in International Journal of Automation and Co… (2016)