[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zhang et al., 2019 - Google Patents

Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance Network

Zhang et al., 2019

Document ID
3160734621474144466
Author
Zhang L
Zou X
Yang M
Publication year
Publication venue
Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City

External Links

Snippet

In this paper, a chain structure of identity authentication based on encrypted database in heterogeneous alliance network was constructed to implement the cross domain access. For preventing the member with lower level from reaching the member with higher level, two …
Continue reading at dl.acm.org (other versions)

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • E05B67/38Auxiliary or protective devices
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • E05B67/06Shackles; Arrangement of the shackle
    • E05B67/08Padlocks with shackles hinged on the case
    • E05B67/18Padlocks with shackles hinged on the case with devices for securing both ends of the shackle

Similar Documents

Publication Publication Date Title
Joshi et al. Unified authentication and access control for future mobile communication‐based lightweight IoT systems using blockchain
Zuo Survivable RFID systems: Issues, challenges, and techniques
Yu et al. A view about cloud data security from data life cycle
Limbasiya et al. An analytical study of biometric based remote user authentication schemes using smart cards
Dua et al. Replay attack prevention in Kerberos authentication protocol using triple password
Singh et al. Security Attacks on RFID and their Countermeasures
Venkatesan et al. Advanced mobile agent security models for code integrity and malicious availability check
Midha et al. A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN.
Gangwani et al. IoT device identity management and blockchain for security and data integrity
Al Shahrani et al. Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model
Said et al. A multi-factor authentication-based framework for identity management in cloud applications
Gupta et al. Fog computing and its security challenges
Rangwani et al. A robust four-factor authentication protocol for resource mining
Gupta et al. Implementing high grade security in cloud application using multifactor authentication and cryptography
Zhang et al. Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance Network
Prem et al. Securing mobile agent and its platform from passive attack of malicious mobile agents
Lath et al. BDESF-ITS: Blockchain-based secure data exchange and storage framework for intelligent transportation system
Shivanna et al. Secure multimodal authentication scheme for wireless sensor networks
Al-Zubaidie et al. User authentication into electronic health record based on reliable lightweight algorithms
Mehta et al. A systematic review of authentication methods for internet of things
Shen et al. AMOGAP: Defending against man-in-the-middle and offline guessing attacks on passwords
Ebrahimpour et al. Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review
Tabassum et al. An enhancement of kerberos using biometric template and steganography
Alhusayni et al. A Multi-Stage Secure IoT Authentication Protocol.
Nguyen et al. Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol