4.2 Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

Zengpeng Li et al.

Summary: Password authentication is a dominant form of access control for the Web and mobile devices, and the use of Password Authenticated Key Exchange (PAKE) systems is recommended for secure data communication. The industry standard suggests using asymmetric-PAKE protocols to prevent password exposure.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Using intelligent ontology technology to extract knowledge from successful project in IoT enterprise systems

Jinfeng Ding et al.

Summary: Learning from successful projects and using ontology-based technology to mine core knowledge can help build business processes in IoT enterprise systems, reduce development costs, and improve user satisfaction.

ENTERPRISE INFORMATION SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices

Shuming Qiu et al.

Summary: This article proposes a provably secure three-factor AKA protocol based on extended chaotic-maps for mobile lightweight devices. By utilizing Fuzzy-Verifiers and Honeywords techniques, the protocol achieves a good balance between security and usability.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Editorial Material Computer Science, Hardware & Architecture

Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017)

Lei Wang et al.

MOBILE NETWORKS & APPLICATIONS (2020)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

Jing Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Artificial Intelligence

Cross-layer congestion control of wireless sensor networks based on fuzzy sliding mode control

Shaocheng Qu et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Information Systems

Blockchain-Enabled Cross-Domain Object Detection for Autonomous Driving: A Model Sharing Approach

Xiantao Jiang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things

Xudong Jia et al.

ELECTRONICS (2020)

Article Mathematics

A New ECDLP-Based PoW Model†

Alessio Meneghetti et al.

MATHEMATICS (2020)

Article Computer Science, Information Systems

Integrity Audit of Shared Cloud Data with Identity Tracking

Yun Xue Yan et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Theory & Methods

LSB: A Lightweight Scalable Blockchain for IoT security and anonymity

Ali Dorri et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Information Systems

A Secure Authentication Protocol for Internet of Vehicles

Chien-Ming Chen et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Blockchain-Based Medical Data Sharing and Protection Scheme

Xiaoguang Liu et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags

King-Hang Wang et al.

JOURNAL OF SUPERCOMPUTING (2018)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

Towards decentralized IoT security enhancement: A blockchain approach

Yongfeng Qian et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Information Systems

Blockchain mechanisms for IoT security

Daniel Minoli et al.

INTERNET OF THINGS (2018)

News Item Computer Science, Hardware & Architecture

Blockchain Beyond Bitcoin

Sarah Underwood

COMMUNICATIONS OF THE ACM (2016)