50 years of biometric research: Accomplishments, challenges, and opportunities
Biometric recognition refers to the automated recognition of individuals based on their
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …
Physical unclonable functions and applications: A tutorial
C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …
authentication and key generation applications. First, it motivates the use of PUFs versus …
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
Secure and lightweight user authentication scheme for cloud-assisted internet of things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …
Lightweight and privacy-preserving two-factor authentication scheme for IoT devices
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT
devices are deployed in the open and public places, which makes them vulnerable to …
devices are deployed in the open and public places, which makes them vulnerable to …
Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …
limitations that need to be addressed in order for their deployment to be more widespread …
Secure remote user authenticated key establishment protocol for smart home environment
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …
applications, such as smart living, smart health and smart transportation. Among all these …