Security and privacy in metaverse: A comprehensive survey

Y Huang, YJ Li, Z Cai - Big Data Mining and Analytics, 2023 - ieeexplore.ieee.org
Metaverse describes a new shape of cyberspace and has become a hot-trending word since
2021. There are many explanations about what Meterverse is and attempts to provide a …

A survey on methods and challenges in EEG based authentication

AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Computers & Security, 2020 - Elsevier
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …

Blockchain for IoT-based healthcare: background, consensus, platforms, and use cases

PP Ray, D Dash, K Salah, N Kumar - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) and blockchain technologies are being heavily exploited and used in
may domains, especially for e-healthcare. In healthcare, IoT devices have the ability to …

SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication

T Alladi, G Bansal, V Chamola… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …

Chatbots: Security, privacy, data protection, and social aspects

M Hasal, J Nowaková, K Ahmed Saghair… - Concurrency and …, 2021 - Wiley Online Library
Chatbots are artificial communication systems becoming increasingly popular and not all
their security questions are clearly solved. People use chatbots for assistance in shopping …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …