We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 1,012 results
  1. Mutual authentication framework using fog computing in healthcare

    The development of the medical services framework is advanced by the development of the Internet of Things (IoT) innovation. There are many...

    Sunakshi Singh, Vijay Kumar Chaurasiya in Multimedia Tools and Applications
    Article 11 April 2022
  2. An efficient mutual authentication and key agreement scheme without password for wireless sensor networks

    Wireless sensor networks (WSNs) are usually deployed in hostile or unattended areas, and users need to obtain real-time data from WSNs. The data...

    Yulei Chen, Jianhua Chen in The Journal of Supercomputing
    Article 29 April 2021
  3. Four-factor mutual authentication scheme for health-care based on wireless body area network

    Health-care is one of the major concerns for every individual; however, it is not always possible to physically visit the health-care center in...

    Diksha Rangwani, Hari Om in The Journal of Supercomputing
    Article 05 October 2021
  4. Pragmatic authenticated key agreement for IEEE Std 802.15.6

    The IEEE Std 802.15.6 is the latest international standard for Wireless Body Area Networks. The security of communication in this standard is based...

    Haibat Khan, Benjamin Dowling, Keith M. Martin in International Journal of Information Security
    Article Open access 27 October 2021
  5. Review on Privacy Preservation Techniques and Challenges in IoT Devices

    The Internet of Things has revolutionized by connecting everyday objects to the Internet, we interact with our surroundings. However, the massive...
    Prakash Meena, Brijesh Jajal, Samrat Khanna in Advancements in Smart Computing and Information Security
    Conference paper 2024
  6. A Game-Based Secure Trading of Big Data and IoT Services: Blockchain as a Two-Sided Market

    The blockchain technology has recently proved to be an efficient solution for guaranteeing the security of data transactions in data trading...
    Ahmed Saleh Bataineh, Jamal Bentahar, ... Gaith Rjoub in Service-Oriented Computing
    Conference paper 2020
  7. Quadratic residue-based unilateral authentication protocol for RFID system

    Nowadays, Radio frequency identification (RFID) plays an important role in many real-life applications for remotely identifying objects. RFID system...

    Pramod Kumar Maurya, Satya Bagchi in Multimedia Tools and Applications
    Article 15 November 2022
  8. Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions

    We study witness-authenticated key exchange (WAKE), in which parties authenticate through knowledge of a witness to any NP statement. WAKE achieves...
    Matteo Campanelli, Rosario Gennaro, ... Luca Nizzardo in Financial Cryptography and Data Security
    Conference paper 2024
  9. A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage

    The ability of data owner in secure and efficient arbitrary data sharing with others is of great importance in the outsourced encrypted data on the...

    Kobra Alimohammadi, Majid Bayat, Hamid H. S. Javadi in Multimedia Tools and Applications
    Article 03 December 2019
  10. Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment

    Cloud hosting is a kind of storage that enables users to access, save, and manage their data in a secure and private cloud environment. As a result...

    Dilli Babu Salvakkam, Rajendra Pamula in Journal of Intelligent Information Systems
    Article 21 May 2022
  11. IoT Security Vulnerabilities and Defensive Measures in Industry 4.0

    The Internet of things (IoT) has been emerging technology for the past decade. IoT can be defined as the network connecting objects to the Internet...
    Koppula Manasa, L. M. I. Leo Joseph in Artificial Intelligence and Cyber Security in Industry 4.0
    Chapter 2023
  12. LLM-Aided Social Media Influence Operations

    Social media platforms enable largely unrestricted many-to-many communication. In times of crisis, they offer a space for collective sense-making and...
    Chapter Open access 2024
  13. Blockchain based authentication and access control protocol for IoT

    The integration of various advancements, ongoing management, intellectual capacity, item sensors, and incorporated frameworks have all contributed to...

    Akanksha Singh, Harish Chandra, ... Deepak Chhikara in Multimedia Tools and Applications
    Article 14 November 2023
  14. The Sensory Enrichment and Interactivity of Immersive User Experiences in the Public Sector: The Ionian Film Office Metaverse

    This chapter examines the current state of the art in the implementation of virtual reality technologies in the public sector, specifically focusing...
    Ioannis Deliyannis, Iakovos Panagopoulos, ... Rossetos Metzitakos in Augmented and Virtual Reality in the Metaverse
    Chapter 2024
  15. PUF-Based Two-Factor Group Authentication in Smart Home

    Various IoT-based applications such as smart home, intelligent medical and VANETs, have been put into practical utilization. Smart home is one of the...
    Sai Ji, Rongxin Qi, Jian Shen in Security and Privacy in New Computing Environments
    Conference paper 2021
  16. Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice

    It is crucial and challenging to design a quantum-secure and efficient authentication key agreement scheme for IoT. The reasons are that not only...
    **hua Wang, Ting Chen, ... **nFeng Dong in Security and Privacy in New Computing Environments
    Conference paper 2023
  17. Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions

    Wireless transmission of information using water as a communication channel is one of the potential technologies for the progress of potential...

    Swati Gupta, Niraj Pratap Singh in The Journal of Supercomputing
    Article 25 September 2023
  18. Blockchain assisted AHMFA authentication in employee performance assessment system

    The concept of blockchain has attained more attention recently to promote secured encryption and decryption, especially in industrial explorations...

    R. Vignesh, K. Mohana Prasad in Multimedia Tools and Applications
    Article 30 May 2023
  19. Authenticated key agreement protocols for dew-assisted IoT systems

    Dew computing is complementing fog and cloud computing by offering the first layer of connection for any IoT device in the field. Typically, data are...

    Article 28 February 2022
  20. A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces

    The usage of intelligent IoT devices is exponentially rising, and so the possibility of attacks in the IoT surfaces. The deep leaning algorithms are...

    Ahmed Barnawi, Shivani Gaba, ... Neeraj Kumar in Neural Computing and Applications
    Article 02 June 2023
Did you find what you were looking for? Share feedback.