[HTML][HTML] Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Security issues in implantable medical devices: Fact or fiction?

V Hassija, V Chamola, BC Bajpai, S Zeadally - Sustainable Cities and …, 2021 - Elsevier
Smart healthcare is an integral part of smart cities. Modern medical devices are becoming
increasingly software dependent. Doctors and patients are now using their smart-phones to …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication

T Alladi, G Bansal, V Chamola… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …

Survey on collaborative smart drones and internet of things for improving smartness of smart cities

SH Alsamhi, O Ma, MS Ansari, FA Almalki - Ieee Access, 2019 - ieeexplore.ieee.org
Smart cities contain intelligent things which can intelligently automatically and
collaboratively enhance life quality, save people's lives, and act a sustainable resource …

Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

X Li, J Niu, S Kumari, F Wu, AK Sangaiah… - Journal of Network and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

B Bera, D Chattaraj, AK Das - Computer Communications, 2020 - Elsevier
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …

AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment

M Wazid, P Bagga, AK Das, S Shetty… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …