Results 1 to 10 of about 95,826 (286)

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge

open access: yesSensors, 2022
Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi   +2 more
doaj   +3 more sources

Identity Authentication of Multi-Modal Fusion Based on Behavioral Footprint [PDF]

open access: yesJisuanji gongcheng, 2021
Among identity verification methods, the single-mode verification methods rely on single features, and are vulnerable to forged authentication and attacks.To solve the problem, an implicit authentication method of multi-modal feature fusion based on user
LIN Mengqi, ZHANG Xiaomei
doaj   +1 more source

BioShare: An Open Framework for Trusted Biometric Authentication under User Control

open access: yesApplied Sciences, 2022
Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode.
Quan Sun, Jie Wu, Wenhai Yu
doaj   +1 more source

A Secure Two-group Authentication Protocol [PDF]

open access: yesJisuanji gongcheng, 2018
In order to solve the problem that the authentication cipher security risk of the traditional 1-to-1 and m-to-1 authentication mode is easier to leak,the paper proposes a m-to-n authentication mode,which includes m clients and n authentication servers.m ...
LIU Zhuo,MA Minyao,QIU Ke’e,FENG Jun
doaj   +1 more source

Evaluation and Comparison of the Performance of Biometric Recognition [PDF]

open access: yesInternational Journal of Industrial Engineering and Production Research, 2022
For several years, considerable efforts have been made in the field of biometric research. The major interest of this line of research is linked, among other things, to the recognition of the individual because the security needs are becoming ...
Fatima Zohra ALLAM   +2 more
doaj  

Research and Implementation of Multi-source Account Authentication for High-Performance Computing Environment [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
High-performance computing (HPC) environment provides researchers with high level high-performance computing application services with unified access entrance, unified use method and user technical support through shielding the heterogeneity of job ...
HE Rong, XIAO Haili, WANG Xiaoning, CHI Xuebin
doaj   +1 more source

Adaptive Thresholds of EEG Brain Signals for IoT Devices Authentication

open access: yesIEEE Access, 2021
In this paper, a new authentication method has been proposed for the Internet of Things (IoT) devices. This method is based on electroencephalography EEG signals, and hand gestures. The proposed EEG signals authentication method used a low price NeuroSky
Abdelghafar R. Elshenaway   +1 more
doaj   +1 more source

Mobile terminal identity authentication system based on behavioral characteristics

open access: yesInternational Journal of Distributed Sensor Networks, 2020
We propose a new type of authentication system based on behavioral characteristics for smartphone users. With the sensor and touch screen data in the smartphone, the combination of the motion state detection mode and the authentication mode can ...
Xiaoshi Liang   +3 more
doaj   +1 more source

Design of Embedded Low-power Intelligent Key with Function of Radio Frequency Identification [PDF]

open access: yesJisuanji gongcheng, 2017
For the matching of multiple locks and multiple keys,a low-power intelligent key which is applied to the active authentication with embedded radio frequency identification is designed.The management of multiple locks is realized by means of authorized ...
JIANG Cunbo,KONG Xiangli,JIN Hong,JIAO Yang
doaj   +1 more source

Design and Implementation of Blockchain-based Trust Gateway for Power Internet of Things

open access: yesZhongguo dianli, 2021
In order to ensure the cyber security of bulk power system, a distributed dynamic gateway architecture based on blockchain and access authentication mechanism is proposed regarding the vulnerabilities of gateway to cyberattacks in the complex ...
Bingzhen ZHAO   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy