End-to-end encryption in resource-constrained IoT device
ASD Alluhaidan, P Prabu - IEEE Access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …
regardless of their local network and resource capacities. Ensuring the security …
A secured one time password authentication technique using (3, 3) visual cryptography scheme
AO Christiana, AN Oluwatobi, GA Victory… - journal of physics …, 2019 - iopscience.iop.org
The world is vastly becoming a completely digital one with most transactions carried out over
the internet. This has exposed the internet to increasing threats and attacks and has …
the internet. This has exposed the internet to increasing threats and attacks and has …
[PDF][PDF] Securing one time password (OTP) for multi-factor out-of-band authentication through a 128-bit blowfish algorithm
Authentication and cryptography have been used to address security issues on various
online services. However, studies have shown that even the most commonly-used multi …
online services. However, studies have shown that even the most commonly-used multi …
BISC authentication algorithm: An efficient new authentication algorithm using three factor authentication for mobile banking
S Shaju, V Panchami - 2016 Online International Conference …, 2016 - ieeexplore.ieee.org
Mobile banking, is a hottest topic in the development of banking sector which is expected to
be replaced by online or net banking in the near future. Mobile banking is done through …
be replaced by online or net banking in the near future. Mobile banking is done through …
BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users
Short Message Service (SMS) is a widely used communication medium for mobile
applications, such as banking, social networking, and e-commerce. Applications of SMS …
applications, such as banking, social networking, and e-commerce. Applications of SMS …
A secure fair exchange for SMS‐based mobile payment protocols based on symmetric encryption algorithms with formal verification
C Thammarat, W Kurutach - Wireless Communications and …, 2018 - Wiley Online Library
Information security and fair exchange are essential to creating trust among all the parties
participating in any sale transaction. However, implementing them in any mobile commerce …
participating in any sale transaction. However, implementing them in any mobile commerce …
Information security in health care centre using cryptography and steganography
AO Babatunde, AJ Taiwo, EG Dada - arXiv preprint arXiv:1803.05593, 2018 - arxiv.org
As the volume of medicinal information stored electronically increase, so do the need to
enhance how it is secured. The inaccessibility to patient record at the ideal time can prompt …
enhance how it is secured. The inaccessibility to patient record at the ideal time can prompt …
Using sms for communication with IoT devices
P Pistek, M Hudec - Mobile Networks and Applications, 2020 - Springer
This paper is in the context of Smart Cities and Internet of Things (IoT). We proposed a novel
approach in communication of IoT devices via SMS messages. This can be beneficial during …
approach in communication of IoT devices via SMS messages. This can be beneficial during …
Blowfish algorithm for patient health monitoring
SS Kondawar, DH Gawali - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Wireless medical devices are very useful for monitoring the health of patients continuously.
Wearable medical devices come in contact with the harsh environment many times. Hence …
Wearable medical devices come in contact with the harsh environment many times. Hence …
Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords: A Structured Literature Review
A Iriarte Murgiondo - 2022 - diva-portal.org
Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it
has been around for decades in the world of computer security. In theory, has the purpose to …
has been around for decades in the world of computer security. In theory, has the purpose to …