Hands-free authentication for virtual assistants with trusted IoT device and machine learning

VT Hayashi, WV Ruggiero - Sensors, 2022 - mdpi.com
Virtual assistants, deployed on smartphone and smart speaker devices, enable hands-free
financial transactions by voice commands. Even though these voice transactions are …

[HTML][HTML] Adaptive edge security framework for dynamic IoT security policies in diverse environments

MN Halgamuge, D Niyato - Computers & Security, 2025 - Elsevier
The rapid expansion of Internet of Things (IoT) technologies has introduced significant
cybersecurity challenges, particularly at the network edge where IoT devices operate …

Result-pattern-hiding conjunctive searchable symmetric encryption with forward and backward privacy

D Yuan, C Zuo, S Cui, G Russello - Proceedings on Privacy …, 2023 - petsymposium.org
Dynamic searchable symmetric encryption (DSSE) enables the data owner to outsource its
database (document sets) to an untrusted server and make searches and updates securely …

Risk assessment method of IoT host based on attack graph

H Yang, H Yuan, L Zhang - Mobile Networks and Applications, 2023 - Springer
With the rapid development and widespread application of the Internet of things (IoT), how to
comprehensively and effectively evaluate the risk of the host in the IoT is of great …

Authconformer: Sensor-based continuous authentication of smartphone users using a convolutional transformer

M Hu, K Zhang, R You, B Tu - Computers & Security, 2023 - Elsevier
To prevent the leakage of personal information on smartphones, a method that can
authenticate the smartphone user's identity throughout the session is essential. Sensor …

A UAV-assisted UE access authentication scheme for 5G/6G network

R Ma, J Cao, S He, Y Zhang, B Niu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unmanned Aircraft Vehicles (UAVs) equipped with base stations can assist ground User
Equipments (UEs) in accessing the 5G/6G network. Due to the UAV's high autonomy, easy …

An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies

X Feng, J Ma, H Wang, Y Miao, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The surging interest in cryptocurrency has revitalized the research for digital signature
schemes with strong security. In particular, signature schemes are investigated to resist the …

Perception layer lightweight certificateless authentication scheme for IoT-based emergency logistics

J Yang, J Fan, X Zhu - IEEE Access, 2023 - ieeexplore.ieee.org
Emergency logistics is of great significance for supply security in emergencies. As a crucial
component of strategic material reserve and allocation, emergency logistics is characterized …

APCAS: Autonomous privacy control and authentication sharing in social networks

W Wen, J Fan, Y Zhang, Y Fang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, the increasing development of social networks has brought about many privacy-
related issues. Because users (participants) have different privacy sharing behaviors when …

Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism

O Alruwaili, M Tanveer, FM Alotaibi, W Abdelfattah… - Heliyon, 2024 - cell.com
Abstract As the Internet of Things (IoT) continues its rapid expansion, cloud computing has
become integral to various smart healthcare applications. However, the proliferation of …