50 years of biometric research: Accomplishments, challenges, and opportunities

AK Jain, K Nandakumar, A Ross - Pattern recognition letters, 2016 - Elsevier
Biometric recognition refers to the automated recognition of individuals based on their
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …

Physical unclonable functions and applications: A tutorial

C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …

Lightweight and privacy-preserving two-factor authentication scheme for IoT devices

P Gope, B Sikdar - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT
devices are deployed in the open and public places, which makes them vulnerable to …

Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment

M Wazid, AK Das, N Kumar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

M Wazid, AK Das, V Bhat, AV Vasilakos - Journal of Network and Computer …, 2020 - Elsevier
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …

A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

X Li, J Niu, MZA Bhuiyan, F Wu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …