Results 291 to 296 of about 319,627 (296)
Some of the next articles are maybe not open access.

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

IEEE Transactions on Vehicular Technology, 2019
A user (external party) is interested in accessing the real-time data from some designated drones of a particular fly zone in the Internet of Drones (IoD) deployment.
Jangirala Srinivas   +3 more
semanticscholar   +1 more source

Cloud Centric Authentication for Wearable Healthcare Monitoring System

IEEE Transactions on Dependable and Secure Computing, 2019
Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers.
Jangirala Srinivas   +3 more
semanticscholar   +1 more source

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound

IEEE Transactions on Dependable and Secure Computing, 2018
Ding Wang, Ping Wang
semanticscholar   +1 more source

Authentication

Encyclopedia of Biometrics, 2018
Michael Melone
semanticscholar   +1 more source

Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain

IEEE Transactions on Industrial Informatics, 2021
Xiaoding Wang   +5 more
semanticscholar   +1 more source

Entity Authentication and Key Distribution

Annual International Cryptology Conference, 1993
M. Bellare, P. Rogaway
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy