Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Recent advances in clonal selection algorithms and applications

W Luo, X Lin - 2017 IEEE Symposium Series on Computational …, 2017 - ieeexplore.ieee.org
Clonal selection algorithms (CSAs) are a kind of Artificial Immune Algorithms (AIAs). In this
paper, recent advances in clonal selection algorithms are summarized and reviewed. First …

A clonal selection algorithm for dynamic multimodal function optimization

W Luo, X Lin, T Zhu, P Xu - Swarm and Evolutionary Computation, 2019 - Elsevier
The objective of dynamic multimodal optimization problems (DMMOPs) is to find all global
optima in a dynamic environment. Although dynamic optimization problems (DOPs) have …

Authentication by encrypted negative password

W Luo, Y Hu, H Jiang, J Wang - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Secure password storage is a vital aspect in systems based on password authentication,
which is still the most widely used authentication technique, despite some security flaws. In …

Lightweight one‐time password authentication scheme based on radio‐frequency fingerprinting

Y Chen, H Wen, H Song, S Chen, F Xie… - IET …, 2018 - Wiley Online Library
The energy‐constrained devices such as the mobile terminals and nodes of the Internet of
Things make lightweight security schemes an urgent need. The traditional identity …

A survey on smart home authentication: Toward secure, multi-level and interaction-based identification

S AlJanah, N Zhang, SW Tay - IEEE Access, 2021 - ieeexplore.ieee.org
With the increased number and reduced cost of smart devices, Internet of Things (IoT)
applications such as smart home (SHome) are increasingly popular. Owing to the …

A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability

SZ Nizamani, SR Hassan, RA Shaikh… - IEEE …, 2021 - ieeexplore.ieee.org
Despite numerous efforts, developing an authentication scheme that offers strong security
while offering memorability and usability remains a grand challenge. In this paper, we …

A secured one time password authentication technique using (3, 3) visual cryptography scheme

AO Christiana, AN Oluwatobi, GA Victory… - journal of physics …, 2019 - iopscience.iop.org
The world is vastly becoming a completely digital one with most transactions carried out over
the internet. This has exposed the internet to increasing threats and attacks and has …

An efficient two-factor authentication scheme based on negative databases: Experiments and extensions

R Liu, X Wang, C Wang - Applied Soft Computing, 2022 - Elsevier
With the rapid development of network communication technology, identity authentication
based on smart cards is one of the most common two-factor authentication schemes. In …

A novel approach for generating one-time password with secure distribution

MHS AbouSteit, AF Tammam… - 2020 Fourth World …, 2020 - ieeexplore.ieee.org
Authentication nowadays is an important issue that cannot depend only on static passwords
because it is vulnerable and subjected to many types of attacks. Many researchers …