Results 1 to 10 of about 319,627 (296)

A review of multi-factor authentication in the Internet of Healthcare Things

open access: yesDigital Health, 2023
Objective This review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next ...
Tance Suleski   +3 more
semanticscholar   +1 more source

Physical-Layer Authentication for Ambient Backscatter-Aided NOMA Symbiotic Systems

open access: yesIEEE Transactions on Communications, 2023
Ambient backscatter communication (AmBC) and non-orthogonal multiple access (NOMA) are two promising technologies for the future wireless communication networks owing to their high energy and spectral efficiencies.
Xingwang Li   +6 more
semanticscholar   +1 more source

A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2022
Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a variety of services acting as an avatar. To build a secure living habitat, it’s vital to ensure the virtual-physical traceability that tracking a malicious ...
Kedi Yang   +3 more
semanticscholar   +1 more source

Physical Unclonable Functions for Device Authentication and Secret Key Generation

open access: yes2007 44th ACM/IEEE Design Automation Conference, 2007
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs).
G. Suh, S. Devadas
semanticscholar   +1 more source

A Formal Analysis of 5G Authentication [PDF]

open access: yesConference on Computer and Communications Security, 2018
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used.
D. Basin   +5 more
semanticscholar   +1 more source

Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication

open access: yesNature Communications, 2019
An ideal anti-counterfeiting technique has to be inexpensive, mass-producible, nondestructive, unclonable and convenient for authentication. Although many anti-counterfeiting technologies have been developed, very few of them fulfill all the above ...
Yang Liu   +15 more
semanticscholar   +1 more source

Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive and private information.
Mohammad Abuhamad   +3 more
semanticscholar   +1 more source

A Survey of Internet of Things (IoT) Authentication Schemes †

open access: yesItalian National Conference on Sensors, 2019
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables ...
Mohammed El-hajj   +3 more
semanticscholar   +1 more source

Light Weight Authentication Scheme for Smart Home IoT Devices [PDF]

open access: gold, 2022
Vipin Kumar   +5 more
openalex   +1 more source

Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing

open access: yesACM Trans. Comput. Hum. Interact., 2021
There is a growing need for usable and secure authentication in immersive virtual reality (VR). Established concepts (e.g., 2D authentication schemes) are vulnerable to observation attacks, and most alternatives are relatively slow. We present RubikAuth,
Florian Mathis   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy