Search
Search Results
-
Mutual authentication framework using fog computing in healthcare
The development of the medical services framework is advanced by the development of the Internet of Things (IoT) innovation. There are many...
-
An efficient mutual authentication and key agreement scheme without password for wireless sensor networks
Wireless sensor networks (WSNs) are usually deployed in hostile or unattended areas, and users need to obtain real-time data from WSNs. The data...
-
Four-factor mutual authentication scheme for health-care based on wireless body area network
Health-care is one of the major concerns for every individual; however, it is not always possible to physically visit the health-care center in...
-
Pragmatic authenticated key agreement for IEEE Std 802.15.6
The IEEE Std 802.15.6 is the latest international standard for Wireless Body Area Networks. The security of communication in this standard is based...
-
Review on Privacy Preservation Techniques and Challenges in IoT Devices
The Internet of Things has revolutionized by connecting everyday objects to the Internet, we interact with our surroundings. However, the massive... -
A Game-Based Secure Trading of Big Data and IoT Services: Blockchain as a Two-Sided Market
The blockchain technology has recently proved to be an efficient solution for guaranteeing the security of data transactions in data trading... -
Quadratic residue-based unilateral authentication protocol for RFID system
Nowadays, Radio frequency identification (RFID) plays an important role in many real-life applications for remotely identifying objects. RFID system...
-
Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions
We study witness-authenticated key exchange (WAKE), in which parties authenticate through knowledge of a witness to any NP statement. WAKE achieves... -
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
The ability of data owner in secure and efficient arbitrary data sharing with others is of great importance in the outsourced encrypted data on the...
-
Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment
Cloud hosting is a kind of storage that enables users to access, save, and manage their data in a secure and private cloud environment. As a result...
-
IoT Security Vulnerabilities and Defensive Measures in Industry 4.0
The Internet of things (IoT) has been emerging technology for the past decade. IoT can be defined as the network connecting objects to the Internet... -
LLM-Aided Social Media Influence Operations
Social media platforms enable largely unrestricted many-to-many communication. In times of crisis, they offer a space for collective sense-making and... -
Blockchain based authentication and access control protocol for IoT
The integration of various advancements, ongoing management, intellectual capacity, item sensors, and incorporated frameworks have all contributed to...
-
The Sensory Enrichment and Interactivity of Immersive User Experiences in the Public Sector: The Ionian Film Office Metaverse
This chapter examines the current state of the art in the implementation of virtual reality technologies in the public sector, specifically focusing... -
PUF-Based Two-Factor Group Authentication in Smart Home
Various IoT-based applications such as smart home, intelligent medical and VANETs, have been put into practical utilization. Smart home is one of the... -
Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice
It is crucial and challenging to design a quantum-secure and efficient authentication key agreement scheme for IoT. The reasons are that not only... -
Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions
Wireless transmission of information using water as a communication channel is one of the potential technologies for the progress of potential...
-
Blockchain assisted AHMFA authentication in employee performance assessment system
The concept of blockchain has attained more attention recently to promote secured encryption and decryption, especially in industrial explorations...
-
Authenticated key agreement protocols for dew-assisted IoT systems
Dew computing is complementing fog and cloud computing by offering the first layer of connection for any IoT device in the field. Typically, data are...
-
A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces
The usage of intelligent IoT devices is exponentially rising, and so the possibility of attacks in the IoT surfaces. The deep leaning algorithms are...