Challenges of multi-factor authentication for securing advanced IoT applications
… when coining novel authentication schemes, and we review … , since the user is not required
to perform any explicit action. … camera nearby to participate in the authentication process. …
to perform any explicit action. … camera nearby to participate in the authentication process. …
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems
… and security is important in such environments. In this paper, we design a new authentication
scheme … some mathematical preliminaries required in detailing the proposed scheme. …
scheme … some mathematical preliminaries required in detailing the proposed scheme. …
A lightweight anonymous user authentication and key establishment scheme for wearable devices
… a new lightweight anonymous user authentication scheme for … scheme is based on five-step
authentication model where a user initiates an authentication phase by contacting a required …
authentication model where a user initiates an authentication phase by contacting a required …
Blockchain-based authentication and authorization for smart city applications
C Esposito, M Ficco, BB Gupta - Information Processing & Management, 2021 - Elsevier
… Such a multi-tenant deployment model is required to lower the … security policy and attributes
within the security systems … As, when data are changed, all the participants see such a …
within the security systems … As, when data are changed, all the participants see such a …
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
… The security of transmitted messages between these participants is a paramount concern; …
u , R g , R s which satisfy required security length and are generated by three different sources …
u , R g , R s which satisfy required security length and are generated by three different sources …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
… factor authentication cannot provide sufficient security required for … entities are permitted to
participate in the CAV systems. … Liao, “Security enhancement on a new authentication scheme …
participate in the CAV systems. … Liao, “Security enhancement on a new authentication scheme …
Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
SG Lyastani, M Schilling, M Neumayr… - … on Security and …, 2020 - ieeexplore.ieee.org
… as the incumbent web authentication scheme is the FIDO2 … Through hands-on tasks our
participants gather first-hand … Because a physical object is required for authentication, the …
participants gather first-hand … Because a physical object is required for authentication, the …
A decentralized scalable security framework for end‐to‐end authentication of future IoT communication
PSF Sheron, KP Sridhar, S Baskar… - Transactions on …, 2020 - Wiley Online Library
… The robustness of the authentication scheme is verified … , nodes, and users participating in
the communication. The … The required devices for verification are hence retained other than …
the communication. The … The required devices for verification are hence retained other than …
Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
… more secure and memorable passwords than the participants in … authentication schemes
which aim at aligning security and … passwords, users are typically required to adhere to a set of …
which aim at aligning security and … passwords, users are typically required to adhere to a set of …
Iot passport: A blockchain-based trust framework for collaborative internet-of-things
B Tang, H Kang, J Fan, Q Li, R Sandhu - … of the 24th ACM symposium on …, 2019 - dl.acm.org
… of participating platforms and end users, and opens new avenues … , which is commonly
required in most commodity user scenarios. … -based authentication system for IoT. Computers & …
required in most commodity user scenarios. … -based authentication system for IoT. Computers & …