A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu… - … Computer Systems, 2018 - Elsevier
… The concrete architecture of WMSN in personalizedhealthcare systems is demonstrated in
Fig. 1. There are three kinds of participants in a classic WMSN: the professional, or the user, …

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

C Lin, D He, X Huang, KKR Choo… - Journal of network and …, 2018 - Elsevier
security concerns. Thus, we present a blockchain-based system for secure mutual authentication,
… Session key agreement: To securely communicate with participants, the system should …

Continuous and transparent multimodal authentication: reviewing the state of the art

A Al Abdulwahid, N Clarke, I Stengel, S Furnell… - Cluster …, 2016 - Springer
… The identity of a user is required by a system to authenticate/… approaches have been
employed in most security systems … The authors aim at building an authentication system that …

Secure signature-based authenticated key establishment scheme for future IoT applications

S Challa, M Wazid, AK Das, N Kumar, AG Reddy… - Ieee …, 2017 - ieeexplore.ieee.org
… efficiency while reducing human involvement. Cyber-physical … schemes to protect anonymity
and privacy, is required. … RELATED WORK Authentication schemes for IoT networks should …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - … transactions on dependable and secure …, 2016 - ieeexplore.ieee.org
… The participants of this sort of authentication (see Fig. 1) … for evaluating two-factor authentication
schemes. It is composed … sor for performing required operations specified in a scheme.” …

A review on performance, security and various biometric template protection schemes for biometric authentication systems

A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
… So, keeping this information safe is a mandatory task. As the database is large protection
of … template security is concerns in creating a secure biometric authentication system and it …

Overview of Authentication and Access Controls for I&C systems

A Tellabi, J Sassmanhausen… - 2018 IEEE 16th …, 2018 - ieeexplore.ieee.org
… Role-based authentication refers to an authentication scheme … fast dynamics mandatory
for access to a control system or … are a huge number of users that participate in the system. …

[PDF][PDF] New principles for governing Aadhaar: Improving access and inclusion, privacy, security, and identity management

N Anand - Journal of Science Policy & Governance, 2021 - researchgate.net
… The authenticating system encrypts this data package and … , required for PoS systems and
Aadhaar based authentication, is … in all participating governmental schemes is a fundamental …

Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment

AK Das, M Wazid, N Kumar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
… Since h(·) is public, all the participants along with A can access the Hash Oracle too. 2) …
emphasizes the computation costs required for BP2UA and other schemes during the login and …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
… This step offered an improved level of security as the users were required to present the … In
this work, we offer a new authentication scheme that focuses on the vehicle-to-everything (V2X…