Rotating behind security: A lightweight authentication protocol based on iot-enabled cloud computing environments

TY Wu, Q Meng, S Kumari, P Zhang - Sensors, 2022 - mdpi.com
With the rapid development of technology based on the Internet of Things (IoT), numerous
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …

Security-enhanced electro-optic feedback phase chaotic system based on nonlinear coupling of two delayed interfering branches

C Wang, Y Ji, H Wang, L Bai - IEEE Photonics Journal, 2018 - ieeexplore.ieee.org
In this paper, a novel electro-optic feedback phase chaotic system based on nonlinear
coupling of two delayed interfering branches is proposed and analyzed by numerical …

Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions

S Banerjee, V Odelu, AK Das, S Chattopadhyay… - IEEe …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) acts as an umbrella for the Internet-enabled devices for various
applications, such as smart home, smart city, smart grid, and smart healthcare. The …

[HTML][HTML] Tsunami awareness and preparedness in Aotearoa New Zealand: The evolution of community understanding

A Dhellemmes, GS Leonard, DM Johnston… - International Journal of …, 2021 - Elsevier
After catastrophic events such as the 2004 Indian Ocean tsunami and the 2011 Great East
Japan earthquake and tsunami there is a clear need for vulnerable countries like Aotearoa …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …

A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography

C Dai, Z Xu - Ad Hoc Networks, 2022 - Elsevier
A secure and efficient mutual authentication and key agreement scheme is critical to the
security of wireless sensor networks (WSNs). Recently, many authentication schemes for …

Enhancing the security: A lightweight authentication and key agreement protocol for smart medical services in the ioht

TY Wu, L Wang, CM Chen - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) has witnessed significant growth with advancements in Internet
and wireless technologies. In the medical field, the Internet of Health Things (IoHT) has …

On the economics of offline password cracking

J Blocki, B Harsha, S Zhou - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
We develop an economic model of an offline password cracker which allows us to make
quantitative predictions about the fraction of accounts that a rational password attacker …

DBCPA: Dual blockchain-assisted conditional privacy-preserving authentication framework and protocol for vehicular ad hoc networks

J Zhang, Y Jiang, J Cui, D He… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) connect all vehicles through wireless channels. They
provide extensive real-time traffic information services that improve driving safety and traffic …

Puf-based robust and anonymous authentication and key establishment scheme for v2g networks

S Yu, K Park - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
V2G improves flexibility, reliability, and efficiency and ensures effective charging services by
enabling two-way communication along with two-way electricity transmission between the …