An identity management and authentication scheme based on redactable blockchain for mobile networks
… published as a transaction, and transactions are packaged into … It is worth noting that miners
who add data are independent … Network operators authenticate users through SSIs and their …
who add data are independent … Network operators authenticate users through SSIs and their …
BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks
… verification (eg [18]–[20]) in order to minimize verification cost in VANETs. Note that other
signatures with batch verification … protocol, which is of independent interests. Finally, we give …
signatures with batch verification … protocol, which is of independent interests. Finally, we give …
A survey on security and authentication in wireless body area networks
B Narwal, AK Mohapatra - Journal of Systems Architecture, 2021 - Elsevier
… discussion on authentication, design, and development of the authentication scheme and its
… research issues, recommendations for future authentication schemes and future trends for …
… research issues, recommendations for future authentication schemes and future trends for …
Blockchain-assisted secure device authentication for cross-domain industrial IoT
… authentication mechanism for wireless sensor networks. … transactions and writes them into
blocks. This domain-specific information will be acquired by other domains for authentication. …
blocks. This domain-specific information will be acquired by other domains for authentication. …
A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles
… The blockchain is a distributed peer-to-peer network [22], which can also be regarded as a
shared distributed ledger that records all transaction information from the very first time since …
shared distributed ledger that records all transaction information from the very first time since …
A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics
… novel authentication and authorization framework for Blockchain-enabled IoT networks using
… Transaction latency depends on the size of a transaction. Moreover, an increase in the size …
… Transaction latency depends on the size of a transaction. Moreover, an increase in the size …
A blockchain-enabled deduplicatable data auditing mechanism for network storage services
… overhead [11], [12], [13]. However, when data auditing is trivially performed in a network …
who lack mutual trust will independently generate verification metadata for the duplicate file, …
who lack mutual trust will independently generate verification metadata for the duplicate file, …
SCANet: sensor-based continuous authentication with two-stream convolutional neural networks
… authentication monitors the security of a system throughout the login session on mobile
devices. In this article, we present SCANet, a two-stream convolutional neural network–based …
devices. In this article, we present SCANet, a two-stream convolutional neural network–based …
Blockchain-based decentralized authentication modeling scheme in edge and IoT environment
M Zhaofeng, M Jialin, W Jihui… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… authentication system deployment includes the independent … authentication of all users on
the platform. After the blockchain network was created, transactions, initiated by users through …
the platform. After the blockchain network was created, transactions, initiated by users through …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
… protocols have been proposed to secure in-vehicle networks. A broadcast authentication …
authentication code to protect controller area network (CAN) communications. Moreover, they …
authentication code to protect controller area network (CAN) communications. Moreover, they …
相关搜索
- authentication in wireless body area networks
- mobile vehicular networks distributed authentication scheme
- cross-domain authentication internet of drones
- internet of vehicles batch authentication protocol
- internet of vehicles information authentication
- vehicular ad hoc networks batch authentication
- internet of medical things authentication scheme
- continuous authentication convolutional neural networks
- blockchain network authentication scheme
- iot networks node authentication
- internet of vehicles deployment authentication scheme
- vehicular ad hoc networks authentication framework
- vehicular ad hoc networks authentication protocol
- vehicular ad hoc networks authentication scheme
- vehicular ad hoc networks authentication system
- internet of things devices authentication scheme