Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent …
S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA) protocols based on public-key techniques have attracted much attention, providing secure …
The widespread use of mobile devices, sensors, and wireless sensor networks and the progressive development of the Internet of Things (IoT) has motivated medical and health …
D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password authentication has been a subject of intensive research in the past two decades, and …
A user (external party) is interested in accessing the real-time data from some designated drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
P Gope, AK Das, N Kumar… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN having constraints of energy consumption, coverage, connectivity, and security. However …
H Bao, Z Hua, H Li, M Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the nonlinearity and plasticity, memristors are widely used as nonlinear devices for chaotic oscillations or as biological synapses for neuromorphic computations. But discrete …
D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data access in industrial wireless sensor networks (WSNs). However, more often than not, the …
D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a …