Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

ECC based authentication scheme for smart homes

VO Nyangaresi - 2021 International Symposium ELMAR, 2021 - ieeexplore.ieee.org
Smart homes security has attracted a lot of attention from both the industry and academia,
leading to the development of numerous schemes for both key management and …

LightTrust: Lightweight trust management for edge devices in industrial internet of things

IU Din, A Bano, KA Awan, A Almogren… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The phenomenal increase in the usage of Internet promotes the quality of trust in the scope
of the Internet of Things (IoT). Trust is beneficial in the provision of an effective, reliable …

Usable Security: A Systematic Literature Review

F Di Nocera, G Tempestini, M Orsini - Information, 2023 - mdpi.com
Usable security involves designing security measures that accommodate users' needs and
behaviors. Balancing usability and security poses challenges: the more secure the systems …

PUC: Packet update caching for energy efficient IoT-based information-centric networking

IU Din, S Hassan, A Almogren, F Ayub… - Future Generation …, 2020 - Elsevier
The future Internet, known as Information-Centric Networking (ICN), is a realistic solution to
content delivery between the content request generators (subscribers) and the server …

IoT-based biometric recognition systems in education for identity verification services: Quality assessment approach

M Rukhiran, S Wong-In, P Netinant - Ieee Access, 2023 - ieeexplore.ieee.org
Traditional identity verification of students based on the human proctoring approach can
cause a scam identity verification and ineffective processing time, particularly among vast …

EdgeTrust: A lightweight data-centric trust management approach for IoT-based healthcare 4.0

KA Awan, I Ud Din, A Almogren, HA Khattak… - Electronics, 2022 - mdpi.com
Internet of Things (IoT) is bringing a revolution in today's world where devices in our
surroundings become smart and perform daily-life activities and operations with more …

Left-right-front caching strategy for vehicular networks in icn-based internet of things

IU Din, B Ahmad, A Almogren, H Almajed… - IEEE …, 2020 - ieeexplore.ieee.org
In Vehicular Ad-hoc Networks (VANET), vehicles act like mobile nodes for fetching, sharing,
and disseminating important information related to vehicle safety, warning messages …

Doodle-based authentication technique using augmented reality

W Wazir, HA Khattak, A Almogren, MA Khan… - IEEE Access, 2020 - ieeexplore.ieee.org
The emergence of augmented reality (AR) and virtual reality (VR) has revolutionized the
trends in computing devices and modern technologies drastically. With this revolution, there …

[PDF][PDF] A hybrid graphical user authentication scheme in mobile cloud computing environments

KHA Al-Shqeerat, KI Abuzanouneh - International Journal of …, 2021 - core.ac.uk
User authentication is a critical security requirement for accessing resources in cloud
computing systems. A text-based password is a standard user authentication way and it is …