Results 271 to 280 of about 319,627 (296)
Some of the next articles are maybe not open access.
An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs
IEEE transactions on intelligent transportation systems (Print), 2022The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance ...
P. Vijayakumar +3 more
semanticscholar +1 more source
IEEE transactions on intelligent transportation systems (Print), 2022
Secure and efficient access authentication is one of the most important security requirements for vehicular networks, but it is difficult to fulfill due to potential security attacks and long authentication delay caused by high vehicle mobility, etc ...
Anjia Yang +4 more
semanticscholar +1 more source
Secure and efficient access authentication is one of the most important security requirements for vehicular networks, but it is difficult to fulfill due to potential security attacks and long authentication delay caused by high vehicle mobility, etc ...
Anjia Yang +4 more
semanticscholar +1 more source
A Survey of Physical-Layer Authentication in Wireless Communications
IEEE Communications Surveys and Tutorials, 2021Authentication is an important issue in wireless communications because the open nature of the wireless medium provides more security vulnerabilities.
N. Xie, Zhuoyuan Li, Haijun Tan
semanticscholar +1 more source
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
IEEE Transactions on Services Computing, 2020Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security.
Z. Cui +6 more
semanticscholar +1 more source
SoK: Authentication in Augmented and Virtual Reality
IEEE Symposium on Security and Privacy, 2022Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent contenders to today’s personal computers. As personal devices, users will use AR and VR to store and access their sensitive data and thus will need secure and usable ways ...
Sophie Stephenson +5 more
semanticscholar +1 more source
Mass spectrometry in food authentication and origin traceability.
Mass spectrometry reviews (Print), 2022Food authentication and origin traceability are popular research topics, especially as concerns about food quality continue to increase. Mass spectrometry (MS) plays an indispensable role in food authentication and origin traceability.
Xinjing Dou +10 more
semanticscholar +1 more source
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles
IEEE Transactions on Vehicular Technology, 2022Edge-Integrated Internet-of-Vehicles (IoV) sinks service to edge nodes, which responses quickly to vehicles' requests and alleviates the burden of cloud servers.
Meng Shen +4 more
semanticscholar +1 more source
Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi
IEEE Transactions on Mobile Computing, 2021The development of smart homes has advanced the concept of user authentication to not only protecting user privacy but also facilitating personalized services to users. Along this direction, we propose to integrate user authentication with human-computer
Hao Kong +4 more
semanticscholar +1 more source
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
IEEE Journal on Selected Areas in Communications, 2020Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity.
Meng Shen +6 more
semanticscholar +1 more source
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
IEEE Internet of Things Journal, 2021One of the most important and critical requirements for the Internet of Vehicles (IoV) is security under strict latency. Typically, authentication protocols for vehicular ad hoc networks need to authenticate themselves frequently. This results in reduced
M. Aman, Uzair Javaid, B. Sikdar
semanticscholar +1 more source

