[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Roy et al., 2019 - Google Patents

A quantum safe user authentication protocol for the internet of things

Roy et al., 2019

View PDF
Document ID
14214482806064693103
Author
Roy K
Kalita H
Publication year
Publication venue
International Journal of Next-Generation Computing

External Links

Snippet

The forthcoming of the Internet of Things has opened the gates for numerous applications in several domains. Unfortunately, it also has brought along with it several security challenges. IoT devices, being compact in size, has several constraints. Therefore, it becomes a …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Mandal et al. Certificateless-signcryption-based three-factor user access control scheme for IoT environment
Das et al. Provably secure ECC-based device access control and key agreement protocol for IoT environment
Wazid et al. Design of secure key management and user authentication scheme for fog computing services
Ferrag et al. Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
Panda et al. A secure mutual authentication protocol for IoT environment
Amin et al. Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment
Zhao et al. A novel mutual authentication scheme for Internet of Things
Muhal et al. Physical unclonable function based authentication scheme for smart devices in Internet of Things
Li et al. Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
Amin et al. A Two‐Factor RSA‐Based Robust Authentication System for Multiserver Environments
Saqib et al. A systematic security assessment and review of internet of things in the context of authentication
Gong et al. LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things
Srinivas et al. Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
Wang et al. Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card
Li et al. Practical threshold multi-factor authentication
Odelu et al. A secure anonymity preserving authentication scheme for roaming service in global mobility networks
De Smet et al. Lightweight PUF based authentication scheme for fog architecture
Das A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system
Yang et al. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments
Tiwari et al. ACDAS: Authenticated controlled data access and sharing scheme for cloud storage
Amintoosi et al. TAMA: three-factor authentication for multi-server architecture
Roy et al. A quantum safe user authentication protocol for the internet of things
Sureshkumar et al. An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment
Zahednejad et al. A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability