Challenges and opportunities in industry 4.0 for mechatronics, artificial intelligence and cybernetics

V Liagkou, C Stylios, L Pappa, A Petunin - Electronics, 2021 - mdpi.com
Industry 4.0 has risen as an integrated digital manufacturing environment, and it has created
a novel research perspective that has thrust research to interdisciplinarity and exploitation of …

A secure authentication framework to guarantee the traceability of avatars in metaverse

K Yang, Z Zhang, T Youliang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a
variety of services acting as an avatar. To build a secure living habitat, it's vital to ensure the …

How many FIDO protocols are needed? Analysing the technology, security and compliance

A Angelogianni, I Politis, C Xenakis - ACM Computing Surveys, 2024 - dl.acm.org
To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap
between user friendly interfaces and advanced security features, the Fast IDentity Online …

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system

K Ma, G Song, Y Zhou, R Xu, B Yang - Computer Standards & Interfaces, 2024 - Elsevier
In recent years, due to the spread of infectious diseases such as COVID-19, people begin to
use the electronic medical system to obtain remote diagnosis and treatment services, which …

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud

Z Hou, J Ning, X Huang, S Xu, LY Zhang - Computer Standards & Interfaces, 2024 - Elsevier
Attribute-based encryption (ABE) has been widely applied in cloud services for access
control. However, a large number of pairing operations required for decryption affect the …

P4G2Go: a privacy-preserving scheme for roaming energy consumers of the smart grid-to-go

A Farao, E Veroni, C Ntantogian, C Xenakis - Sensors, 2021 - mdpi.com
Due to its flexibility in terms of charging and billing, the smart grid is an enabler of many
innovative energy consumption scenarios. One such example is when a landlord rents their …

Attribute-based pseudonymity for privacy-preserving authentication in cloud services

V Sucasas, G Mantas, M Papaioannou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Attribute-based authentication is considered a cornerstone component to achieve scalable
fine-grained access control in the fast growing market of cloud-based services …

SDN-based privacy and functional authentication scheme for fog nodes of smart healthcare

C Ke, Z Zhu, F Xiao, Z Huang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
As a novel computing paradigm, fog computing can provide more efficient and high-quality
medical services for patients by deploying the smart healthcare system. Smart healthcare …

[HTML][HTML] A privacy-preserving attribute-based framework for IoT identity lifecycle management

J García-Rodríguez, A Skarmeta - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) has brought a new era of interconnected devices and
seamless data exchange. As the IoT ecosystem continues to expand, there is an increasing …

Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering

L Zhao, M Sun, B Yang, J Xie… - Journal of Intelligent & …, 2022 - content.iospress.com
With the digital transformation of enterprises, the traditional security defense technology has
been unable to meet the security requirements of enterprises, and the data security and …