A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Sensors, 2022 - mdpi.com
Achieving rapid message signing and verification for … Several scholars have proposed
to address the security, privacy, and performance efficiency for the VANET system. However, …

A robust and lightweight secure access scheme for cloud based E-healthcare services

M Masud, GS Gaba, K Choudhary, R Alroobaea… - Peer-to-peer Networking …, 2021 - Springer
… is the best fit for protecting data security and privacy in cloud-… identity-based encryption and
an equality test helps achieve a … to enhance the scheme a cost-effective solution for LPWAN. …

Lightweight mutual authentication and privacy-preservation scheme for intelligent wearable devices in industrial-CPS

MA Jan, F Khan, R Khan, S Mastorakis… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
… we propose a lightweight mutual authentication scheme. Our … using an AI-enabled hidden
Markov model. We analyzed the … approach to achieve system efficiency and robustness, and at …

Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach

AT Kiyani, A Lasebae, K Ali, MU Rehman, B Haq - IEEE Access, 2020 - ieeexplore.ieee.org
… In this paper, a true continuous user authentication system … In addition, other statistical
techniques such as Hidden Markov Model [… For an efficient CUA system, ANIA should be as low as …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
… battery); 3) the user-friendliness; 4) the robustness to dynamic … pass the authentication
system using the user’s identity … The n-gram Markov model estimates the probability of the next …

Blockchain-based trust management model for location privacy preserving in VANET

B Li, R Liang, D Zhu, W Chen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… that the proposed system is effective and feasible in collect. … Experiments indicate that our
scheme has strong resistance … The former sends anonymous query requests to RSU to obtain

A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

S Zhang, B Hu, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
… The security analysis of our scheme supports its robustnessprivacy preservation efficiency
to design an efficient caching … by a Markov model based on the user’s mobile model and use

Privacy-preserving sensor-based continuous authentication and user profiling: a review

L Hernández-Álvarez, JM de Fuentes… - Sensors, 2020 - mdpi.com
… Traditionally, it has been achieved by means of passwords, … and not to user authentication
or authentication schemes and, … Although the model did not show high efficiency in predicting …

Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
… important for developing an effective authentication system. … We divide these criteria into
three categories: robustness, usability … Usage Privacy Usage privacy refers to the user's habits …

A comprehensive review on the users' identity privacy for 5G networks

MM Saeed, MK Hasan, AJ Obaid, RA Saeed… - IET …, 2022 - Wiley Online Library
… services failure, continuous Markov chain (CTMC) models were … effective domain query
protocol to maintain privacy in LBS. They adopted a starter membership verification system