Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions

AH Abdi, L Audah, A Salh, MA Alhartomi… - IEEE …, 2024 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …

[HTML][HTML] Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network

A Rasheed, M Baza, M Badr… - … on Network Science …, 2023 - ieeexplore.ieee.org
Smart vehicles and industrial control systems becoming increasingly complex. They are
comprised of a large number of connected intelligence sensor devices. For such systems …

FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite–Terrestrial-Integrated Networks

Y Yang, J Cao, R Ma, L Cheng, L Chen… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The integration of satellite and terrestrial networks presents new opportunities and
challenges for high speed rail (HSR) communications. Since the HSR runs vary fast, user …

An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies

X Feng, J Ma, H Wang, Y Miao, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The surging interest in cryptocurrency has revitalized the research for digital signature
schemes with strong security. In particular, signature schemes are investigated to resist the …

A privacy preserving four-factor authentication protocol for internet of medical things

P Guo, W Liang, S Xu - Computers & Security, 2024 - Elsevier
Medical applications of the Internet of Things (IoT) have gained significant attention,
especially in the context of monitoring health-related information for elderly individuals living …

Lattice-based threshold signcryption for blockchain oracle data transmission

H Yu, H Wang - IEEE Transactions on Intelligent Transportation …, 2023 - ieeexplore.ieee.org
Threshold signature can solve the problems of high cost and network congestion during the
execution of smart contracts. However, the information transmitted in public links is …

An Attack to One-Tap Authentication Services in Cellular Networks

Z Cui, B Cui, J Fu, BK Bhargava - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The One-Tap Authentication (OTAuth) based on the cellular network is a password-less
login service provided by Mobile Network Operator (MNO) through the unique …

Secure Access Control for Electronic Health Records in Blockchain-Enabled Consumer Internet of Medical Things

Y Hong, L Yang, W Liang, A Xie - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The popularization of electronic health records (EHRs) effectively improves the efficiency of
diagnosis and treatment of diseases, however, it also lays a hidden danger for the leakage …