Zhang et al., 2019 - Google Patents
Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance NetworkZhang et al., 2019
- Document ID
- 3160734621474144466
- Author
- Zhang L
- Zou X
- Yang M
- Publication year
- Publication venue
- Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City
External Links
Snippet
In this paper, a chain structure of identity authentication based on encrypted database in heterogeneous alliance network was constructed to implement the cross domain access. For preventing the member with lower level from reaching the member with higher level, two …
- 238000004458 analytical method 0 abstract description 6
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B67/00—Padlocks; Details thereof
- E05B67/38—Auxiliary or protective devices
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B67/00—Padlocks; Details thereof
- E05B67/06—Shackles; Arrangement of the shackle
- E05B67/08—Padlocks with shackles hinged on the case
- E05B67/18—Padlocks with shackles hinged on the case with devices for securing both ends of the shackle
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Joshi et al. | Unified authentication and access control for future mobile communication‐based lightweight IoT systems using blockchain | |
Zuo | Survivable RFID systems: Issues, challenges, and techniques | |
Yu et al. | A view about cloud data security from data life cycle | |
Limbasiya et al. | An analytical study of biometric based remote user authentication schemes using smart cards | |
Dua et al. | Replay attack prevention in Kerberos authentication protocol using triple password | |
Singh et al. | Security Attacks on RFID and their Countermeasures | |
Venkatesan et al. | Advanced mobile agent security models for code integrity and malicious availability check | |
Midha et al. | A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN. | |
Gangwani et al. | IoT device identity management and blockchain for security and data integrity | |
Al Shahrani et al. | Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model | |
Said et al. | A multi-factor authentication-based framework for identity management in cloud applications | |
Gupta et al. | Fog computing and its security challenges | |
Rangwani et al. | A robust four-factor authentication protocol for resource mining | |
Gupta et al. | Implementing high grade security in cloud application using multifactor authentication and cryptography | |
Zhang et al. | Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance Network | |
Prem et al. | Securing mobile agent and its platform from passive attack of malicious mobile agents | |
Lath et al. | BDESF-ITS: Blockchain-based secure data exchange and storage framework for intelligent transportation system | |
Shivanna et al. | Secure multimodal authentication scheme for wireless sensor networks | |
Al-Zubaidie et al. | User authentication into electronic health record based on reliable lightweight algorithms | |
Mehta et al. | A systematic review of authentication methods for internet of things | |
Shen et al. | AMOGAP: Defending against man-in-the-middle and offline guessing attacks on passwords | |
Ebrahimpour et al. | Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review | |
Tabassum et al. | An enhancement of kerberos using biometric template and steganography | |
Alhusayni et al. | A Multi-Stage Secure IoT Authentication Protocol. | |
Nguyen et al. | Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol |