Integration of the internet of things and cloud: Security challenges and solutions–a review
C Surianarayanan, PR Chelliah - International Journal of Cloud …, 2023 - igi-global.com
The integration of IoT and cloud poses increased security challenges. Implementing security
mechanisms in IoT systems is challenging due to the availability of limited resources, large …
mechanisms in IoT systems is challenging due to the availability of limited resources, large …
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
The emerging cloud infrastructure has escalated number of servers offering flexible and
diverse remote services through public channels. However, user authentication in …
diverse remote services through public channels. However, user authentication in …
TBVPAKE: An efficient and provably secure verifier-based PAKE protocol for IoT applications
M Qi, Z Cui, G Liang - Journal of Systems Architecture, 2023 - Elsevier
Password-authenticated key exchange (PAKE) is an important cryptographic primitive by
which two parties are allowed to authenticate each other and establish a cryptographically …
which two parties are allowed to authenticate each other and establish a cryptographically …
Using private set intersection to achieve privacy-preserving authorization for IoT systems
R Cai, L Chen, Y Zhu - Journal of Information Security and Applications, 2024 - Elsevier
We propose a novel approach to utilize private set intersection (PSI) to achieve privacy-
preserving authorization for IoT systems for the first time in this work. Our contribution …
preserving authorization for IoT systems for the first time in this work. Our contribution …
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
NH Kamarudin, NHS Suhaimi, FA Nor Rashid… - Symmetry, 2024 - mdpi.com
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation
of robust security measures such as authentication has become paramount to safeguarding …
of robust security measures such as authentication has become paramount to safeguarding …
Vulnerability Assessment of Security Breach and Deadly Threat in Cloud Computing Environment
A Gupta, S Sinha, HK Singh… - 2023 IEEE 15th …, 2023 - ieeexplore.ieee.org
Cloud computing allows us to access available systems and pay for what we require
whenever needed. When there is access to the internet, it uses some techniques like …
whenever needed. When there is access to the internet, it uses some techniques like …
Smart Farming with Improved Security using Ascon Encryption and Authentication
R Rahul, R Venkatesan… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
The evolution of smart farming through the integration of Internet of Things (IoT) technology
has ushered in a new era of precision agriculture, offering increased efficiency …
has ushered in a new era of precision agriculture, offering increased efficiency …
Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR
S Almarri, M Frikha - 2024 - preprints.org
Due to the rapid growth of the Internet of Things (IoT), securing communications between a
huge number of devices has become very difficult. Access controls and authentication …
huge number of devices has become very difficult. Access controls and authentication …
MDIAM: A Multi-Device Identity Authentication Mechanism Based on Blockchain and Fuzzy Extractor
L Wang, Z Wang, L Zuo, H Liu - 2024 - researchsquare.com
With the widespread deployment of Internet of Things (IoT) devices, security issues with
identity authentication are becoming increasingly prominent. Traditional methods of identity …
identity authentication are becoming increasingly prominent. Traditional methods of identity …
为了回应用户根据美国数字千年版权法案 (DMCA) 向我们提交的投诉,我们已从此页上移除了 1 个结果。如果需要,您可以访问 LumenDatabase.org,查看导致结果遭到移除的 DMCA 投诉内容。