Roy et al., 2019 - Google Patents
A quantum safe user authentication protocol for the internet of thingsRoy et al., 2019
View PDF- Document ID
- 14214482806064693103
- Author
- Roy K
- Kalita H
- Publication year
- Publication venue
- International Journal of Next-Generation Computing
External Links
Snippet
The forthcoming of the Internet of Things has opened the gates for numerous applications in several domains. Unfortunately, it also has brought along with it several security challenges. IoT devices, being compact in size, has several constraints. Therefore, it becomes a …
- 238000000034 method 0 description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mandal et al. | Certificateless-signcryption-based three-factor user access control scheme for IoT environment | |
Das et al. | Provably secure ECC-based device access control and key agreement protocol for IoT environment | |
Wazid et al. | Design of secure key management and user authentication scheme for fog computing services | |
Ferrag et al. | Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues | |
Panda et al. | A secure mutual authentication protocol for IoT environment | |
Amin et al. | Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment | |
Zhao et al. | A novel mutual authentication scheme for Internet of Things | |
Muhal et al. | Physical unclonable function based authentication scheme for smart devices in Internet of Things | |
Li et al. | Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors | |
Li et al. | Applying biometrics to design three‐factor remote user authentication scheme with key agreement | |
Amin et al. | A Two‐Factor RSA‐Based Robust Authentication System for Multiserver Environments | |
Saqib et al. | A systematic security assessment and review of internet of things in the context of authentication | |
Gong et al. | LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things | |
Srinivas et al. | Provably secure biometric based authentication and key agreement protocol for wireless sensor networks | |
Wang et al. | Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card | |
Li et al. | Practical threshold multi-factor authentication | |
Odelu et al. | A secure anonymity preserving authentication scheme for roaming service in global mobility networks | |
De Smet et al. | Lightweight PUF based authentication scheme for fog architecture | |
Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
Yang et al. | Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments | |
Tiwari et al. | ACDAS: Authenticated controlled data access and sharing scheme for cloud storage | |
Amintoosi et al. | TAMA: three-factor authentication for multi-server architecture | |
Roy et al. | A quantum safe user authentication protocol for the internet of things | |
Sureshkumar et al. | An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment | |
Zahednejad et al. | A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability |