Results 271 to 280 of about 319,627 (296)
Some of the next articles are maybe not open access.

An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs

IEEE transactions on intelligent transportation systems (Print), 2022
The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance ...
P. Vijayakumar   +3 more
semanticscholar   +1 more source

Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks

IEEE transactions on intelligent transportation systems (Print), 2022
Secure and efficient access authentication is one of the most important security requirements for vehicular networks, but it is difficult to fulfill due to potential security attacks and long authentication delay caused by high vehicle mobility, etc ...
Anjia Yang   +4 more
semanticscholar   +1 more source

A Survey of Physical-Layer Authentication in Wireless Communications

IEEE Communications Surveys and Tutorials, 2021
Authentication is an important issue in wireless communications because the open nature of the wireless medium provides more security vulnerabilities.
N. Xie, Zhuoyuan Li, Haijun Tan
semanticscholar   +1 more source

A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN

IEEE Transactions on Services Computing, 2020
Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security.
Z. Cui   +6 more
semanticscholar   +1 more source

SoK: Authentication in Augmented and Virtual Reality

IEEE Symposium on Security and Privacy, 2022
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent contenders to today’s personal computers. As personal devices, users will use AR and VR to store and access their sensitive data and thus will need secure and usable ways ...
Sophie Stephenson   +5 more
semanticscholar   +1 more source

Mass spectrometry in food authentication and origin traceability.

Mass spectrometry reviews (Print), 2022
Food authentication and origin traceability are popular research topics, especially as concerns about food quality continue to increase. Mass spectrometry (MS) plays an indispensable role in food authentication and origin traceability.
Xinjing Dou   +10 more
semanticscholar   +1 more source

Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles

IEEE Transactions on Vehicular Technology, 2022
Edge-Integrated Internet-of-Vehicles (IoV) sinks service to edge nodes, which responses quickly to vehicles' requests and alleviates the burden of cloud servers.
Meng Shen   +4 more
semanticscholar   +1 more source

Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi

IEEE Transactions on Mobile Computing, 2021
The development of smart homes has advanced the concept of user authentication to not only protecting user privacy but also facilitating personalized services to users. Along this direction, we propose to integrate user authentication with human-computer
Hao Kong   +4 more
semanticscholar   +1 more source

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT

IEEE Journal on Selected Areas in Communications, 2020
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity.
Meng Shen   +6 more
semanticscholar   +1 more source

A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles

IEEE Internet of Things Journal, 2021
One of the most important and critical requirements for the Internet of Vehicles (IoV) is security under strict latency. Typically, authentication protocols for vehicular ad hoc networks need to authenticate themselves frequently. This results in reduced
M. Aman, Uzair Javaid, B. Sikdar
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy