Results 1 to 10 of about 319,627 (296)
A review of multi-factor authentication in the Internet of Healthcare Things
Objective This review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next ...
Tance Suleski +3 more
semanticscholar +1 more source
Physical-Layer Authentication for Ambient Backscatter-Aided NOMA Symbiotic Systems
Ambient backscatter communication (AmBC) and non-orthogonal multiple access (NOMA) are two promising technologies for the future wireless communication networks owing to their high energy and spectral efficiencies.
Xingwang Li +6 more
semanticscholar +1 more source
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse [PDF]
Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a variety of services acting as an avatar. To build a secure living habitat, it’s vital to ensure the virtual-physical traceability that tracking a malicious ...
Kedi Yang +3 more
semanticscholar +1 more source
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs).
G. Suh, S. Devadas
semanticscholar +1 more source
A Formal Analysis of 5G Authentication [PDF]
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used.
D. Basin +5 more
semanticscholar +1 more source
An ideal anti-counterfeiting technique has to be inexpensive, mass-producible, nondestructive, unclonable and convenient for authentication. Although many anti-counterfeiting technologies have been developed, very few of them fulfill all the above ...
Yang Liu +15 more
semanticscholar +1 more source
Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey [PDF]
Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive and private information.
Mohammad Abuhamad +3 more
semanticscholar +1 more source
A Survey of Internet of Things (IoT) Authentication Schemes †
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables ...
Mohammed El-hajj +3 more
semanticscholar +1 more source
Light Weight Authentication Scheme for Smart Home IoT Devices [PDF]
Vipin Kumar +5 more
openalex +1 more source
Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing
There is a growing need for usable and secure authentication in immersive virtual reality (VR). Established concepts (e.g., 2D authentication schemes) are vulnerable to observation attacks, and most alternatives are relatively slow. We present RubikAuth,
Florian Mathis +3 more
semanticscholar +1 more source

