A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …
People, processes, and things are connected with the Internet through IoT. With the …
[HTML][HTML] A user-centric privacy-preserving authentication protocol for IoT-AmI environments
Abstract Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare
professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has …
professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has …
Privacy protection for blockchain-based healthcare IoT systems: A survey
To enable precision medicine and remote patient monitoring, internet of healthcare things
(IoHT) has gained significant interest as a promising technique. With the widespread use of …
(IoHT) has gained significant interest as a promising technique. With the widespread use of …
Securing cloud native applications using blockchain
P Mendki - 2021 12th International Conference on Information …, 2021 - ieeexplore.ieee.org
Cloud computing technologies have dominated more that a decade. Wider adoption of cloud
based processing has given rise to different architectural patterns. Cloud native applications …
based processing has given rise to different architectural patterns. Cloud native applications …
Continuous Entity Authentication in the Internet of Things Scenario
In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has
led to the need for the constant entity verification of devices. Recently, a formal framework …
led to the need for the constant entity verification of devices. Recently, a formal framework …