Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A quadratic residue-based RFID authentication protocol with enhanced security for TMIS
Zhou, Zhiping, Wang, Ping, Li, Zhicong
Published in Journal of ambient intelligence and humanized computing (01.09.2019)
Published in Journal of ambient intelligence and humanized computing (01.09.2019)
Get full text
Journal Article
Formal Security Analysis of ECC-Based RFID in Logic of Events Theory
Xiao, Meihua, Chen, Quangang, Li, Zehuan, Chen, Yuqiong, Xu, Ruihan
Published in Electronics (Basel) (01.08.2023)
Published in Electronics (Basel) (01.08.2023)
Get full text
Journal Article
A Survey on Lightweight Entity Authentication with Strong PUFs
Delvaux, Jeroen, Peeters, Roel, Gu, Dawu, Verbauwhede, Ingrid
Published in ACM computing surveys (21.11.2015)
Published in ACM computing surveys (21.11.2015)
Get full text
Journal Article
Physical Layer based Message Authentication with Secure Channel Codes
Chen, Dajiang, Zhang, Ning, Cheng, Nan, Zhang, Kuan, Qin, Zhiguang, Shen, Xuemin
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Published in IEEE transactions on dependable and secure computing (01.09.2020)
Get full text
Journal Article
Leakage-resilient biometric-based remote user authentication with fuzzy extractors
Tian, Yangguang, Li, Yingjiu, Sengupta, Binanda, Li, Nan, Su, Chunhua
Published in Theoretical computer science (24.04.2020)
Published in Theoretical computer science (24.04.2020)
Get full text
Journal Article
Rhythmic RFID Authentication
Li, Jiawei, Wang, Chuyu, Li, Ang, Han, Dianqi, Zhang, Yan, Zuo, Jinhang, Zhang, Rui, Xie, Lei, Zhang, Yanchao
Published in IEEE/ACM transactions on networking (01.04.2023)
Published in IEEE/ACM transactions on networking (01.04.2023)
Get full text
Journal Article
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
Wang, Mingzhong, Liu, Dan, Zhu, Liehuang, Xu, Yongjun, Wang, Fei
Published in Computing (01.07.2016)
Published in Computing (01.07.2016)
Get full text
Journal Article
A Highly Secure Reconfigurable Memory-Based Strong PUF for Device Authentication in Internet of Things
Williams, Phillip, Idriss, Haytham, Mohebbi, Mohammad, Bayoumi, Magdy
Published in Proceedings of IEEE Southeastcon (15.03.2024)
Published in Proceedings of IEEE Southeastcon (15.03.2024)
Get full text
Conference Proceeding
Robust biometric authentication system with a secure user template
Ali, Syed Sadaf, Baghel, Vivek Singh, Ganapathi, Iyyakutti Iyappan, Prakash, Surya
Published in Image and vision computing (01.12.2020)
Published in Image and vision computing (01.12.2020)
Get full text
Journal Article
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Odelu, Vanga, Das, Ashok Kumar, Goswami, Adrijit
Published in IEEE transactions on information forensics and security (01.09.2015)
Published in IEEE transactions on information forensics and security (01.09.2015)
Get full text
Journal Article
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication
Ghorbani Lyastani, Sanam, Schilling, Michael, Neumayr, Michaela, Backes, Michael, Bugiel, Sven
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2020)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2020)
Get full text
Conference Proceeding