Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …
mobile devices. We start by providing an overview of existing survey articles published in the …
Anonymous authentication for wireless body area networks with provable security
Advances in wireless communications, embedded systems, and integrated circuit
technologies have enabled the wireless body area network (WBAN) to become a promising …
technologies have enabled the wireless body area network (WBAN) to become a promising …
Improved ECC‐based three‐factor multiserver authentication scheme
A multiserver environment can improve the efficiency of mobile network services more
effectively than a single server in managing the increase in users. Because of the large …
effectively than a single server in managing the increase in users. Because of the large …
Linear SVM‐based android malware detection for reliable IoT services
HS Ham, HH Kim, MS Kim… - Journal of Applied …, 2014 - Wiley Online Library
Current many Internet of Things (IoT) services are monitored and controlled through
smartphone applications. By combining IoT with smartphones, many convenient IoT services …
smartphone applications. By combining IoT with smartphones, many convenient IoT services …
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
Providing secure, efficient, and privacy-preserving user authentication in mobile networks is
a challenging problem due to the inherent mobility of users, variety of attack vectors, and …
a challenging problem due to the inherent mobility of users, variety of attack vectors, and …
Remote authentication schemes for wireless body area networks based on the Internet of Things
Internet of Things (IoT) is a new technology which offers enormous applications that make
people's lives more convenient and enhances cities' development. In particular, smart …
people's lives more convenient and enhances cities' development. In particular, smart …
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities
Mobile devices are an integral part of our society, although ensuring the security and privacy
of both data-at-rest and data-in-transit remains topics of ongoing interest. Privacy-preserving …
of both data-at-rest and data-in-transit remains topics of ongoing interest. Privacy-preserving …
AKAIoTs: authenticated key agreement for Internet of Things
WSNs are one of the important components in the Internet of Things (IoTs), since they
enable gathering and transmitting of data to the cloud server via the Internet medium …
enable gathering and transmitting of data to the cloud server via the Internet medium …
A lightweight authentication protocol for D2D-enabled IoT systems with privacy
CDM Pham, TK Dang - Pervasive and Mobile Computing, 2021 - Elsevier
Abstract The Internet of Things (IoT) has become a popular trend in the technology industry
with the huge benefits it brings by enabling heterogeneous interconnected devices and …
with the huge benefits it brings by enabling heterogeneous interconnected devices and …
An improved certificateless mutual authentication and key agreement protocol for cloud-assisted wireless body area networks
This paper is based on the work published by Cheng et al. in the journal Mobile Networks
and Applications. Cheng et al. proposed a certificateless authentication and key agreement …
and Applications. Cheng et al. proposed a certificateless authentication and key agreement …