Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems
… and security is important in such environments. In this paper, we design a new authentication
scheme … some mathematical preliminaries required in detailing the proposed scheme. …
scheme … some mathematical preliminaries required in detailing the proposed scheme. …
A review on performance, security and various biometric template protection schemes for biometric authentication systems
… So, keeping this information safe is a mandatory task. As the database is large protection
of … template security is concerns in creating a secure biometric authentication system and it …
of … template security is concerns in creating a secure biometric authentication system and it …
Blockchain-based authentication and authorization for smart city applications
C Esposito, M Ficco, BB Gupta - Information Processing & Management, 2021 - Elsevier
… Such a multi-tenant deployment model is required to lower the … security policy and attributes
within the security systems … As, when data are changed, all the participants see such a …
within the security systems … As, when data are changed, all the participants see such a …
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
… The security of transmitted messages between these participants is a paramount concern; …
u , R g , R s which satisfy required security length and are generated by three different sources …
u , R g , R s which satisfy required security length and are generated by three different sources …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
… factor authentication cannot provide sufficient security required for … entities are permitted to
participate in the CAV systems. … Liao, “Security enhancement on a new authentication scheme …
participate in the CAV systems. … Liao, “Security enhancement on a new authentication scheme …
Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
SG Lyastani, M Schilling, M Neumayr… - … on Security and …, 2020 - ieeexplore.ieee.org
… as the incumbent web authentication scheme is the FIDO2 … Through hands-on tasks our
participants gather first-hand … Because a physical object is required for authentication, the …
participants gather first-hand … Because a physical object is required for authentication, the …
A decentralized scalable security framework for end‐to‐end authentication of future IoT communication
PSF Sheron, KP Sridhar, S Baskar… - Transactions on …, 2020 - Wiley Online Library
… The robustness of the authentication scheme is verified … , nodes, and users participating in
the communication. The … The required devices for verification are hence retained other than …
the communication. The … The required devices for verification are hence retained other than …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
… using stronger and easier authentication schemes such as … data for verification, tp refers
to the time required for data … from 97 participants and reported an authentication accuracy …
to the time required for data … from 97 participants and reported an authentication accuracy …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
… Our aim was to analyze the participants‘ perceptions of different authentication schemes. A
… the data required for the different authentication schemes (eg the fingerprint for Fingerprint …
… the data required for the different authentication schemes (eg the fingerprint for Fingerprint …
Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
… , security analysis techniques, security systems, and … As for protocol in [31], it is only required
that the user and the foreign … user involvement to verify the validity of the authentication and …
that the user and the foreign … user involvement to verify the validity of the authentication and …