Aggregated-proof based hierarchical authentication scheme for the internet of things

H Ning, H Liu, LT Yang - IEEE Transactions on Parallel and …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming an attractive system paradigm to realize
interconnections through the physical, cyber, and social spaces. During the interactions …

[图书][B] Unit and ubiquitous internet of things

H Ning - 2013 - books.google.com
Although the Internet of Things (IoT) will play a key role in the development of next
generation information, network, and communication technologies, many are still unclear …

Enhanced lightweight algorithm to secure data transmission in IoT systems

S Jebri, A Ben Amor, M Abid, A Bouallegue - Wireless Personal …, 2021 - Springer
Abstract The Internet of Things (IoT) is the most recent Internet evolution that integrates
many smart devices, such as constrained devices, smart tablets, smart vehicles, smart …

Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption

KS Patil, I Mandal, C Rangaswamy - Pervasive and Mobile Computing, 2022 - Elsevier
Abstract The Internet of Things (IoT) in communication networks has gained major interest in
recent decades. Accordingly, secure authentication of such individuals results in a major …

A survey of applications of threshold cryptography—proposed and practiced

V Venukumar, V Pathari - Information Security Journal: A Global …, 2016 - Taylor & Francis
Threshold cryptography is a secret sharing technique that finds applications in many fields
including cloud computing, authentication, the Internet of Things, ad-hoc and sensor …

Stac-protocol: Secure and trust anonymous communication protocol for iot

S Jebri, M Abid, A Bouallegue - 2017 13th International …, 2017 - ieeexplore.ieee.org
Security and privacy are prominent tasks in resource constrained devises in Internet of
Things (IoT) and Wireless Sensor Networks (WSN). Therefore, to ensure anonymity and …

A critical analysis on the security architectures of internet of things: The road ahead

VV Jog, TS Murugan - Journal of Intelligent Systems, 2018 - degruyter.com
Abstract Internet of Things (IoT) has been a most important research area for almost a
decade now, where a huge network of billions or trillions of “things” communicating with one …

Data importance and feedback based adaptive level of authorization for the security of Internet of Things

VV Jog - Journal of Engineering Research, 2019 - kuwaitjournals.org
With the rapid development of Internet of Things (IoT), it is widely used in various IoT
applications. Generally, the IoT is used to interconnect each computing device assist by the …

A biometrics-based SSO authentication scheme in Telematics

D Liu, ZJ Zhang, N Zhang - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
This paper proposes a novel biometrics-based Single Sign On user authentication scheme
in Telematics system, in order to enable to protect user account privacy. The contribution of …

Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things

V V. Jog - International Journal of Intelligent Computing and …, 2017 - emerald.com
Purpose Due to the connectivity of the multiple devices and the systems on the same
network, rapid development has become possible in Internet of Things (IoTs) for the last …