[PDF][PDF] Intelligent authentication for identity and access management: a review paper

IA Mohammed - International Journal of Managment, IT and …, 2013 - researchgate.net
identity management activities like password resets and audits, while also increasing security
via the use of multifactor authentication. It … , which improves security while simultaneously …

[PDF][PDF] Identity Management Security Authentication Based on Blockchain Technologies.

P Fan, Y Liu, J Zhu, X Fan, L Wen - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
… The experimental analysis showed that the method could meet the securityidentity
security authentication system and simulated and analyzed the block chain and security

[HTML][HTML] Authentication and identity management of IoHT devices: achievements, challenges, and future directions

M Mamdouh, AI Awad, AAM Khalaf, HFA Hamed - Computers & Security, 2021 - Elsevier
… IoT device authentication mechanisms and identity management … for secure IoHT systems
and devices. These topics include device identity, device authentication, and key management

Towards a lightweight identity management and secure authentication for IoT using blockchain

S Ismail, D Dawoud, H Reza - 2022 IEEE World AI IoT …, 2022 - ieeexplore.ieee.org
… based identity management and secure authentication … and authenticate the IoT nodes
for secure communication, … IoT security. Section III describes the proposed mechanism for …

[PDF][PDF] Identity management: analysis of secure authentication propositions

RJ da Silva Torres - 2020 - repositorio-aberto.up.pt
… In this section, we will review what Federated Identity Management is, what are the requirements
for a proper Identity and Access Management (IAM) solution and will give an overview …

Blockchain technology the identity management and authentication service disruptor: a survey

SY Lim, PT Fotsing, A Almasri… - International …, 2018 - researchportal.hw.ac.uk
authentication and self-sovereign identity management can … secure and reliable authentication
and identity management … a secure platform for service providers to authenticate users …

Blockchain based authentication for identity management

H Nusantoro, R Supriati, N Azizah… - … Management  …, 2021 - ieeexplore.ieee.org
… research is that Blockchain technology can create trust and security in cooperative settings.
… With this identity management research using Blockchain technology, it can offer answers by …

An identity management and authentication scheme based on redactable blockchain for mobile networks

J Xu, K Xue, H Tian, J Hong, DSL Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… We aim to achieve a secure and efficient identity management and authentication in wireless
mobile networks. Specifically, our design goals include the following: r Identity Security: For …

[PDF][PDF] User centric identity management

A Jøsang, S Pope - AusCERT Asia Pacific information technology security …, 2005 - Citeseer
… This paper takes a new look at identity management, and proposes … compatible with traditional
identity management systems. … SSL security model is that the SP identity authenticated by …

[HTML][HTML] Cloud identity management security issues & solutions: a taxonomy

U Habiba, R Masood, MA Shibli, MA Niazi - Complex Adaptive Systems …, 2014 - Springer
… the brain, where the connecting neurons are already authenticated, cloud systems require
extensive authentication as well as identity management systems. Still, these are simply not …