Loading…
IoT Authentication Protocols: Challenges, and Comparative Analysis
Alsheavi, Amar N., Hawbani, Ammar, Othman, Wajdy, Wang, Xingfu, Qaid, Gamil, Zhao, Liang, Al-Dubai, Ahmed, Zhi, Liu, Ismail, A.s., Jhaveri, Rutvij, Alsamhi, Saeed, Al-Qaness, Mohammed A. A.
Published in ACM computing surveys (09.01.2025)
Published in ACM computing surveys (09.01.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Jiang, Qi, Ma, Jianfeng, Lu, Xiang, Tian, Youliang
Published in Peer-to-peer networking and applications (01.11.2015)
Published in Peer-to-peer networking and applications (01.11.2015)
Get full text
Journal Article
Loading…
Loading…
A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices
Wan, Tao, Ge, Jingjing, Liao, Weichuan, Zhao, Haixia
Published in Wireless personal communications (01.05.2024)
Published in Wireless personal communications (01.05.2024)
Get full text
Journal Article
Loading…
Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones
Zhou, Lina, Kang, Yin, Zhang, Dongsong, Lai, Jianwei
Published in Decision Support Systems (01.12.2016)
Published in Decision Support Systems (01.12.2016)
Get full text
Journal Article
Loading…
Systematic design of a family of attack-resistant authentication protocols
Bird, R., Gopal, I., Herzberg, A., Janson, P.A., Kutten, S., Molva, R., Yung, M.
Published in IEEE journal on selected areas in communications (01.06.1993)
Published in IEEE journal on selected areas in communications (01.06.1993)
Get full text
Journal Article
Loading…
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Jiang, Qi, Ma, Jianfeng, Ma, Zhuo, Li, Guangsong
Published in Journal of medical systems (01.02.2013)
Published in Journal of medical systems (01.02.2013)
Get full text
Journal Article
Loading…
Loading…
Assessing the Solid Protocol in Relation to Security and Privacy Obligations
Esposito, Christian, Horne, Ross, Robaldo, Livio, Buelens, Bart, Goesaert, Elfi
Published in Information (Basel) (01.07.2023)
Published in Information (Basel) (01.07.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Double-authentication-preventing signatures
Poettering, Bertram, Stebila, Douglas
Published in International journal of information security (01.02.2017)
Published in International journal of information security (01.02.2017)
Get full text
Journal Article
Loading…
Unbalanced states violates RFID privacy
Erguler, Imran, Anarim, Emin, Saldamli, Gokay
Published in Journal of intelligent manufacturing (01.04.2014)
Published in Journal of intelligent manufacturing (01.04.2014)
Get full text
Journal Article