Konu "USER AUTHENTICATION" için İGÜ Akademik Birimleri listeleme
Toplam kayıt 4, listelenen: 1-4
-
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2020)The on demand availability of resources in Cyber physical system (CPS) has emerged as a viable service providing platform to improve the resource usability and reducing the infrastructure costs. Nevertheless, the development ... -
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment
(SPRINGER HEIDELBERG, TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY, 2020)In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739-8752, 2019; 10.1109/JIOT.2019.2931372) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a ... -
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA, 2020)The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the ... -
Security and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric Key
(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019)Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things ...