A survey on methods and challenges in EEG based authentication
AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Computers & Security, 2020 - Elsevier
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …
progressive development of the Internet of Things (IoT) has motivated medical and health …
TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
If all vehicles are connected together through a wireless communication channel, vehicular
ad hoc networks (VANETs) can support a wide range of real-time traffic information services …
ad hoc networks (VANETs) can support a wide range of real-time traffic information services …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
Memristor-based hyperchaotic maps and application in auxiliary classifier generative adversarial nets
With the nonlinearity and plasticity, memristors are widely used as nonlinear devices for
chaotic oscillations or as biological synapses for neuromorphic computations. But discrete …
chaotic oscillations or as biological synapses for neuromorphic computations. But discrete …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions
S Yu, Y Park - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Wireless medical sensor networks (WMSNs)-based medical systems are an emerging
paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can …
paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can …