-
1Academic Journal
Source: European Journal of Electrical Engineering and Computer Science. 8:1-8
Subject Terms: FOS: Computer and information sciences, Security Protocols for Authentication and Key Exchange, Authentication, Computer Networks and Communications, Theoretical Framework of Cognitive Informatics and Computational Intelligence, 02 engineering and technology, Remote User Authentication, Security Challenges in Cloud Computing, Cloud Computing, Computer science, Programming language, Operating system, Artificial Intelligence, Computer security, Authentication (law), Computer Science, Physical Sciences, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing security, Cloud computing, Factor (programming language), Information Systems
-
2Academic Journal
Authors: Wenting Li, Ping Wang, Kaitai Liang
Source: IEEE Transactions on Information Forensics and Security. 18:1596-1609
Subject Terms: FOS: Computer and information sciences, Challenge–response authentication, Password cracking, User Authentication Methods and Security Measures, Computer Networks and Communications, FOS: Political science, Zero-knowledge password proof, FOS: Law, 02 engineering and technology, S/KEY, Password, Characterization and Detection of Android Malware, leakage detection, Computer security, honeyword, 0202 electrical engineering, electronic engineering, information engineering, Password strength, One-time password, Key Exchange, Political science, password-authenticated key exchange, Insider, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, SAFER, Graphical Passwords, Computer science, Information leakage, Password policy, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Security, Authentication protocol, Passwords, Law, Information Systems
Linked Full Text -
3Academic Journal
Authors: Kirti A. Yadav, P. Vijayakumar
Source: IEEE Access, Vol 11, Pp 49540-49548 (2023)
Linked Full TextSubject Terms: FOS: Computer and information sciences, Mutual authentication, Replay attack, Computer Networks and Communications, User Authentication Methods and Security Measures, Routing Protocols, Remote User Authentication, 7. Clean energy, Database, Internet of Vehicles, Engineering, Computer security, Roaming, FOS: Electrical engineering, electronic engineering, information engineering, communication cost, Electrical and Electronic Engineering, Key (lock), Security Protocols for Authentication and Key Exchange, Authentication, Computer network, Continuous Authentication, Scalability, Computer science, computation cost, TK1-9971, intelligent transport system (ITS), privacy preservation, Authentication (law), Physical Sciences, Computer Science, Vehicular Ad Hoc Networks and Communications, Electrical engineering. Electronics. Nuclear engineering, Authentication protocol, roaming, Information Systems
-
4Academic Journal
Authors: Nurshamimi Salleh, Hailiza Kamarulhaili, Laith Abualigah
Source: International Journal of Data and Network Science, Vol 7, Iss 2, Pp 765-780 (2023)
Subject Terms: Security Protocols for Authentication and Key Exchange, Chaos-based Image Encryption Techniques, Computer Networks and Communications, NTRU, Social Sciences, Encryption, Public-key cryptography, HD28-70, Computer science, 7. Clean energy, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, Computer security, Computer Science, Physical Sciences, Management. Industrial management, Security Analysis, Computer Vision and Pattern Recognition, Key (lock)
-
5Academic Journal
Authors: W. Gracy Theresa, A. Gayathri, P. Rama
Source: Intelligent Automation & Soft Computing. 35:1337-1351
Subject Terms: Ad Hoc Wireless Networks Research, Computer Networks and Communications, Routing Protocols, Organic chemistry, 02 engineering and technology, 7. Clean energy, Layer (electronics), Cooperative Diversity in Wireless Networks, Computer security, 11. Sustainability, 0202 electrical engineering, electronic engineering, information engineering, Multi-hop Wireless Routing, Ad Hoc Networks, Security Protocols for Authentication and Key Exchange, Computer network, Network packet, Mobile Ad Hoc Networks, Intrusion detection system, Wireless ad hoc network, Computer science, Vehicular ad hoc network, Routing protocol, Chemistry, Mobile ad hoc network, Computer Science, Physical Sciences, Mobility Models, Wireless, Telecommunications, Network layer, Frame (networking)
-
6Academic Journal
Authors: Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Zen, Johari Abdullah, Rozeha Binti A. Rashid, Yasir Javed, Nayeem Ahmad Khan, Ahmed M. Mostafa
Source: IEEE Access, Vol 11, Pp 20524-20541 (2023)
Subject Terms: Denial-of-service attack, Computer Networks and Communications, MITM attack, Password, Engineering, QA76 Computer software, Computer security, TK5101-6720 Telecommunication, MIMO Systems, FOS: Electrical engineering, electronic engineering, information engineering, cell-free, ECDH, Electrical and Electronic Engineering, TK7885-7895 Computer engineer. Computer hardware, 6G, Security Protocols for Authentication and Key Exchange, Computer network, Physical Layer Security in Wireless Communications, 9. Industry and infrastructure, lightweight multifactor, Intelligent Reflecting Surfaces in Wireless Communications, Computer science, TK1-9971, World Wide Web, Authentication (law), Computer Science, Physical Sciences, authentication, Electrical engineering. Electronics. Nuclear engineering, Authentication protocol, The Internet
Linked Full TextFile Description: text; application/pdf
-
7Academic Journal
Authors: Asmaa Halbouni, Lee-Yeng Ong, Meng-Chew Leow
Source: IEEE Access, Vol 11, Pp 112438-112450 (2023)
Subject Terms: Alternative medicine, Computer Networks and Communications, Wireless Transport Layer Security, Encryption, Cryptographic protocol, WPA3, Engineering, Wireless security, Artificial Intelligence, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Pathology, Electrical and Electronic Engineering, Wi-Fi, Wireless network, Security Protocols for Authentication and Key Exchange, Computer network, TK5101-6720 Telecommunication. Including telegraphy, Transport Layer Security (TLS), television, Computer science, Wi-Fi Protected Access 3, TK1-9971, radio, Wireless Mobility and Network Handoff Management, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Protocol (science), Wireless, Cryptography, Telecommunications, Security Protocols, Medicine, telephone, Wireless security protocol, Electrical engineering. Electronics. Nuclear engineering, Wireless Sensor Networks, radar
Linked Full TextFile Description: text
-
8Academic Journal
Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-Based Smart Home
Authors: Zeeshan Ashraf, Adnan Sohail, Abdul Hameed, Muhammad Farhan, Faiz Abdullah Alotaibi, Mrim M. Alnfiai
Source: IEEE Access, Vol 11, Pp 137899-137910 (2023)
Linked Full TextSubject Terms: FOS: Computer and information sciences, Smart objects, Smart Cards, smart home, Computer Networks and Communications, User Authentication Methods and Security Measures, IPv6, IoT security, Internet of Things, Encryption, Remote User Authentication, 7. Clean energy, Computer security, Embedded system, security analysis, Security Protocols for Authentication and Key Exchange, Authentication, 6LoWPAN, Computer network, 9. Industry and infrastructure, Home automation, key exchange, Continuous Authentication, NGN, Secure Routing, Computer science, TK1-9971, Operating system, Authentication (law), Secure communication, Computer Science, Physical Sciences, Telecommunications, Electrical engineering. Electronics. Nuclear engineering, Security in Wireless Sensor Networks, Authentication protocol, IPv6 address, The Internet, Information Systems
-
9Academic Journal
Authors: S. Sankar, S. Revathi, R. Thiagarajan
Source: Computer Systems Science and Engineering. 45:625-640
Subject Terms: Exploit, Certification, Computer Networks and Communications, FOS: Political science, Encryption, Structural engineering, FOS: Law, Remote User Authentication, Node (physics), 02 engineering and technology, 7. Clean energy, Engineering, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Political science, Wireless network, Key distribution in wireless sensor networks, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, Wireless Sensor Networks: Survey and Applications, Secure Routing, Sensor node, Public-key cryptography, Computer science, Intrusion Detection, Attack Detection, Authentication (law), Computer Science, Physical Sciences, Wireless, Telecommunications, Security in Wireless Sensor Networks, Law, Wireless sensor network
-
10Academic Journal
Authors: Pramod Kumar Maurya, Haradhan Ghosh, Satya Bagchi
Source: IEEE Access, Vol 11, Pp 10563-10577 (2023)
Linked Full TextSubject Terms: Replay attack, Alternative medicine, Otway–Rees protocol, Computer Networks and Communications, Hash-based message authentication code, Aerospace Engineering, FOS: Mechanical engineering, Remote User Authentication, 02 engineering and technology, privacy, Message authentication code, Cryptographic protocol, Reflection attack, RFID Technology and Applications, Database, Engineering, Computer security, Media Technology, Pathology, 0202 electrical engineering, electronic engineering, information engineering, MDS code, Antenna Design and Applications, Wide Mouth Frog protocol, Security Protocols for Authentication and Key Exchange, RFID, Authentication, Computer network, Security analysis, anonymity set, Scalability, Computer science, Challenge-Handshake Authentication Protocol, TK1-9971, group homomorphism, Algorithm, RFID system, Authentication (law), Physical Sciences, Computer Science, Protocol (science), Cryptography, Security Protocols, Medicine, Electrical engineering. Electronics. Nuclear engineering, Authentication protocol, Correctness, Authentication Protocol
-
11Academic Journal
Authors: Wenting Li, Haibo Cheng, Píng Wang, Kaitai Liang
Source: IEEE Transactions on Information Forensics and Security ( Volume: 16)
Subject Terms: FOS: Computer and information sciences, Secure Multi-party Computation, User Authentication Methods and Security Measures, Computer Networks and Communications, Flexibility (engineering), Usability, Servers, Remote User Authentication, 02 engineering and technology, Password, Artificial Intelligence, Computer security, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Key Exchange, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, Advanced Cryptographic Schemes and Protocols, Threshold, Statistics, Continuous Authentication, Graphical Passwords, Multi-Factor Authentication, Computer science, Challenge-Handshake Authentication Protocol, Login, Operating system, Authentication (law), Computer Science, Physical Sciences, Security, Authentication protocol, Biometrics (access control), Multi-factor authentication, Protocols, Mathematics, Information Systems
Linked Full TextAccess URL: https://zenodo.org/record/6038478/files/Practical_Threshold_Multi-Factor_Authentication.pdf
https://www.narcis.nl/publication/RecordID/oai%3Atudelft.nl%3Auuid%3Afd1d3321-6a8f-442e-9d62-e83ab0369e61
https://research.tudelft.nl/en/publications/practical-threshold-multi-factor-authentication
https://dblp.uni-trier.de/db/journals/tifs/tifs16.html#LiCWL21
http://resolver.tudelft.nl/uuid:fd1d3321-6a8f-442e-9d62-e83ab0369e61 -
12Academic Journal
Authors: Saeed Ullah Jan, Habib Ullah Khan
Source: IEEE Access, Vol 9, Pp 130247-130263 (2021)
Subject Terms: Computer Networks and Communications, Routing Protocols, Encryption, Vehicular Ad Hoc Networks, Remote User Authentication, 7. Clean energy, Aggregation, Internet of Vehicles, Engineering, Artificial Intelligence, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Genetics, Electrical and Electronic Engineering, Biology, encryption, Random oracle, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, Advanced Cryptographic Schemes and Protocols, Public-key cryptography, 16. Peace & justice, Computer science, Drone, TK1-9971, paring cryptography, Authentication (law), FOS: Biological sciences, Computer Science, Physical Sciences, unforgeability, authentication, Vehicular Ad Hoc Networks and Communications, Electrical engineering. Electronics. Nuclear engineering
File Description: application/pdf
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/6514899/09530542.pdf
https://doaj.org/article/ad606009db8b44589ade53c775bfe144
https://dblp.uni-trier.de/db/journals/access/access9.html#JanK21
https://ieeexplore.ieee.org/document/9530542/figures
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85114720216&origin=inward
https://hdl.handle.net/10576/37621 -
13Academic Journal
Authors: Saeed Ullah Jan, Fawad Qayum, Habib Ullah Khan
Source: IEEE Access, Vol 9, Pp 69287-69306 (2021)
Subject Terms: Replay attack, Alternative medicine, Computer Networks and Communications, Unmanned Aerial Vehicle Communications, Aerospace Engineering, FOS: Mechanical engineering, security, drone, Message authentication code, 7. Clean energy, miniaturization, Internet of Vehicles, Engineering, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Genetics, Pathology, Access control, Electrical and Electronic Engineering, Drone Applications, Biology, FANET, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, cryptography, Computer science, Drone, TK1-9971, Authentication (law), FOS: Biological sciences, Computer Science, Physical Sciences, Protocol (science), Cryptography, Vehicular Ad Hoc Networks and Communications, Medicine, Electrical engineering. Electronics. Nuclear engineering, Authentication protocol, Confidentiality
File Description: application/pdf
-
14Academic Journal
Authors: Arij Ben Amor, Sarra Jebri, Mohamed Abid, Aref Meddeb
Source: The Journal of Supercomputing. 79:13578-13600
Subject Terms: Security Protocols for Authentication and Key Exchange, FOS: Computer and information sciences, Mutual authentication, Computer Networks and Communications, User Authentication Methods and Security Measures, Internet of Things, Blockchain and Internet of Things Integration, Scalability, 0211 other engineering and technologies, 02 engineering and technology, Computer science, Mathematical analysis, Database, Computer security, Authentication (law), Computer Science, Physical Sciences, Hash function, Cryptography, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Anonymity, Mathematics, Information Systems, Scheme (mathematics)
-
15Academic Journal
Source: IEEE Access, Vol 10, Pp 52791-52803 (2022)
Linked Full TextSubject Terms: FOS: Computer and information sciences, Mutual authentication, Smart Cards, Computer Networks and Communications, User Authentication Methods and Security Measures, Internet of Things, Encryption, security, 02 engineering and technology, Message authentication code, 7. Clean energy, Computer security, gateway, 0202 electrical engineering, electronic engineering, information engineering, encryption, curve, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, cryptography, Chaos-based Image Encryption Techniques, Public-key cryptography, 16. Peace & justice, Computer science, TK1-9971, Elliptic curve cryptography, Authentication (law), Computer Science, Physical Sciences, Hash function, Security, Cryptography, Security Analysis, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, Authentication protocol, Information Systems
-
16Academic Journal
Source: IEEE Access, Vol 10, Pp 95321-95343 (2022)
Subject Terms: FOS: Computer and information sciences, Computer Networks and Communications, User Authentication Methods and Security Measures, QA75 Electronic computers. Computer science, 02 engineering and technology, sensors, Mathematical analysis, 7. Clean energy, drones, Artificial Intelligence, Computer security, 11. Sustainability, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, 14. Life underwater, latency, Scheme (mathematics), Security Protocols for Authentication and Key Exchange, Authentication, Computer network, Advanced Cryptographic Schemes and Protocols, Continuous Authentication, Computer science, TK1-9971, Authentication (law), Computer Science, Physical Sciences, integrity, authorization, Electrical engineering. Electronics. Nuclear engineering, Manageability, Mathematics, Information Systems
Linked Full TextFile Description: text
-
17Academic Journal
Authors: Muhammad Tanveer, Ahmed Alkhayyat, Alamgir Naushad, Abd Ullah Khan, Neeraj Kumar, Abdullah G. Alharbi
Source: IEEE Access, Vol 10, Pp 19836-19851 (2022)
Subject Terms: Internet of Drone, Computer Networks and Communications, Unmanned Aerial Vehicle Communications, Internet of Things, Aerospace Engineering, FOS: Mechanical engineering, Encryption, security, Remote User Authentication, 02 engineering and technology, privacy, 7. Clean energy, Internet of Vehicles, Password, Engineering, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Drone Applications, Random oracle, Security Protocols for Authentication and Key Exchange, Authentication, Software engineering, key exchange, Public-key cryptography, Computer science, TK1-9971, Physical Sciences, Computer Science, Cryptography, Vehicular Ad Hoc Networks and Communications, Electrical engineering. Electronics. Nuclear engineering, unmanned aerial vehicles, Oracle
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/6514899/09705541.pdf
https://doaj.org/article/3e7b916fab2a4168ab383b3f8a0aeb76 -
18Academic Journal
Authors: Mahmood A. Al-Shareeda, Selvakumar Manickam
Source: IEEE Access, Vol 10, Pp 120606-120615 (2022)
Linked Full TextSubject Terms: Denial-of-service attack, Computer Networks and Communications, Routing Protocols, Group signature, Encryption, security, Vehicular Ad Hoc Networks, 02 engineering and technology, privacy, Mathematical analysis, 7. Clean energy, Modular square root (MSR), Internet of Vehicles, Engineering, Computer security, 11. Sustainability, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Scheme (mathematics), Security Protocols for Authentication and Key Exchange, Computer network, Digital Image Watermarking Techniques, Wireless ad hoc network, Public-key cryptography, Computer science, Vehicular ad hoc network, vehicular network, denial of service (DoS), TK1-9971, 3. Good health, 5G technology, Overhead (engineering), World Wide Web, Operating system, Physical Sciences, Computer Science, Cryptography, Wireless, Telecommunications, Vehicular Ad Hoc Networks and Communications, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, Anonymity, The Internet, Mathematics
-
19Academic Journal
Authors: Muhammad Tanveer, Abd Ullah Khan, Ahmed Alkhayyat, Shehzad Ashraf Chaudhry, Yousaf Bin Zikria, Sung Won Kim
Source: IEEE Access, Vol 10, Pp 23008-23021 (2022)
Subject Terms: FOS: Computer and information sciences, Computer Networks and Communications, User Authentication Methods and Security Measures, Biomedical Engineering, Wireless Body Area Networks in Healthcare, Encryption, Remote User Authentication, 02 engineering and technology, privacy, FOS: Medical engineering, 12. Responsible consumption, Engineering, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), TIMS, AEAD, Security Protocols for Authentication and Key Exchange, e-healthcare, Authentication, Computer network, Public-key cryptography, Computer science, TK1-9971, smart city, Authentication (law), 8. Economic growth, Computer Science, Physical Sciences, Hash function, Security, authentication, Electrical engineering. Electronics. Nuclear engineering, Session key, Information Systems
File Description: application/pdf
Linked Full TextAccess URL: https://doaj.org/article/7617086a9383481ba1bd8c2f68c32a41
https://hdl.handle.net/11363/5740 -
20Academic Journal
Authors: A. S. Anakath, S. Ambika, S. Rajakumar, R. Kannadasan, K. Sathish Kumar
Source: Computer Systems Science and Engineering. 43:833-847
Subject Terms: FOS: Computer and information sciences, Computer Networks and Communications, User Authentication Methods and Security Measures, Fingerprint, Structural engineering, Remote User Authentication, Node (physics), 02 engineering and technology, 7. Clean energy, Engineering, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, Key Exchange, Kerberos, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, Network packet, Continuous Authentication, Biometric Recognition and Security Systems, Computer science, 3. Good health, Operating system, Authentication (law), Signal Processing, Computer Science, Physical Sciences, Information Systems