Related references
Note: Only part of the references are listed.Revolution or Evolution? Technical Requirements and Considerations towards 6G Mobile Communications
Saddam Alraih et al.
SENSORS (2022)
A distributed adaptive optimization spiking neural P system for approximately solving combinatorial optimization problems
Jianping Dong et al.
INFORMATION SCIENCES (2022)
Global optimization on non-convex two-way interaction truncated linear multivariate adaptive regression splines using mixed integer quadratic programming
Xinglong Ju et al.
INFORMATION SCIENCES (2022)
Identity authentication based on trajectory characteristics of mobile devices
Zhigang Gao et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2021)
Implicit authentication method for smartphone users based on rank aggregation and random forest
Mohamed W. Abo El-Soud et al.
ALEXANDRIA ENGINEERING JOURNAL (2021)
eID and Self-Sovereign Identity Usage: An Overview
Daniela Poehn et al.
ELECTRONICS (2021)
Impact of Perceived Risk on Consumers Technology Acceptance in Online Grocery Adoption amid COVID-19 Pandemic
Sufyan Habib et al.
SUSTAINABILITY (2021)
A Survey of Physical-Layer Authentication in Wireless Communications
Ning Xie et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)
Intelligent mobile malware detection using permission requests and API calls
Moutaz Alazab et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Physical unclonable functions
Yansong Gao et al.
NATURE ELECTRONICS (2020)
A survey on authentication and access control for mobile networks: from 4G to 5G
Shanay Behrad et al.
ANNALS OF TELECOMMUNICATIONS (2019)
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
Mohamed Amine Ferrag et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Provably secure pseudo-identity based device authentication for smart cities environment
Alavalapati Goutham Reddy et al.
SUSTAINABLE CITIES AND SOCIETY (2018)
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
Debiao He et al.
COMPUTER NETWORKS (2017)
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA
Khodor Hamandi et al.
COMPUTER COMMUNICATIONS (2017)
A Survey of Wearable Biometric Recognition Systems
Jorge Blasco et al.
ACM COMPUTING SURVEYS (2016)
LTE/LTE-A Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation
Marc Lichtman et al.
IEEE COMMUNICATIONS MAGAZINE (2016)
Physical-layer authentication for wireless security enhancement: current challenges and future developments
Xianbin Wang et al.
IEEE COMMUNICATIONS MAGAZINE (2016)
A survey on 5G: The next generation of mobile communication
Nisha Panwar et al.
PHYSICAL COMMUNICATION (2016)
Human Identification Using Compressed ECG Signals
Carmen Camara et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
A Survey on Security Aspects for LTE and LTE-A Networks
Jin Cao et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Privacy-Enhancing Security Protocol in LTE Initial Attack
Uijin Jang et al.
SYMMETRY-BASEL (2014)
LTE/SAE Security Issues on 4G Wireless Networks
Anastasios N. Bikos et al.
IEEE SECURITY & PRIVACY (2013)
A survey on biometric cryptosystems and cancelable biometrics
Christian Rathgeb et al.
EURASIP JOURNAL ON INFORMATION SECURITY (2011)
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
Chun-I Fan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)
New Approaches for Deniable Authentication
Mario Di Raimondo et al.
JOURNAL OF CRYPTOLOGY (2009)
A novel deniable authentication protocol using generalized ElGamal signature scheme
Wei-Bin Lee et al.
INFORMATION SCIENCES (2007)
An identity management protocol for Internet applications over 3G mobile networks
CK Dimitriadis et al.
COMPUTERS & SECURITY (2006)
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
ZH Shao
COMPUTER STANDARDS & INTERFACES (2004)
Fingerprint-based remote user authentication scheme using smart cards
JK Lee et al.
ELECTRONICS LETTERS (2002)
Risks of the Passport single signon protocol
DP Kormann et al.
COMPUTER NETWORKS (2000)