Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems

S Challa, AK Das, P Gope, N Kumar, F Wu… - … Computer Systems, 2020 - Elsevier
… and security is important in such environments. In this paper, we design a new authentication
scheme … some mathematical preliminaries required in detailing the proposed scheme. …

A review on performance, security and various biometric template protection schemes for biometric authentication systems

A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
… So, keeping this information safe is a mandatory task. As the database is large protection
of … template security is concerns in creating a secure biometric authentication system and it …

Blockchain-based authentication and authorization for smart city applications

C Esposito, M Ficco, BB Gupta - Information Processing & Management, 2021 - Elsevier
… Such a multi-tenant deployment model is required to lower the … security policy and attributes
within the security systems … As, when data are changed, all the participants see such a …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
… The security of transmitted messages between these participants is a paramount concern; …
u , R g , R s which satisfy required security length and are generated by three different sources …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… factor authentication cannot provide sufficient security required for … entities are permitted to
participate in the CAV systems. … Liao, “Security enhancement on a new authentication scheme

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … on Security and …, 2020 - ieeexplore.ieee.org
… as the incumbent web authentication scheme is the FIDO2 … Through hands-on tasks our
participants gather first-hand … Because a physical object is required for authentication, the …

A decentralized scalable security framework for end‐to‐end authentication of future IoT communication

PSF Sheron, KP Sridhar, S Baskar… - Transactions on …, 2020 - Wiley Online Library
… The robustness of the authentication scheme is verified … , nodes, and users participating in
the communication. The … The required devices for verification are hence retained other than …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
… using stronger and easier authentication schemes such as … data for verification, tp refers
to the time required for data … from 97 participants and reported an authentication accuracy …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
… Our aim was to analyze the participants‘ perceptions of different authentication schemes. A
… the data required for the different authentication schemes (eg the fingerprint for Fingerprint …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - … Systems, 2020 - Springer
… , security analysis techniques, security systems, and … As for protocol in [31], it is only required
that the user and the foreign … user involvement to verify the validity of the authentication and …