Accès libre

Extended Authentication Based on Geometric Patterns and Transformations

 et   
26 nov. 2024
À propos de cet article

Citez
Télécharger la couverture

Gupta, Purnima & Sinha, Amit & Srivastava, Prabhat & Perti, Ashwin & Singh, Aswani. (2021). Security Implementations in IoT Using Digital Signature. 10.1007/978-981-15-4692-1_40. GuptaPurnima SinhaAmit SrivastavaPrabhat PertiAshwin SinghAswani 2021 Security Implementations in IoT Using Digital Signature 10.1007/978-981-15-4692-1_40 Open DOISearch in Google Scholar

Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Message Authentication Codes. 10.1002/9781118722367.ch6. FergusonNiels SchneierBruce KohnoTadayoshi 2015 Message Authentication Codes 10.1002/9781118722367.ch6 Open DOISearch in Google Scholar

Galbally, Javier & Marcel, Sébastien & Fierrez, Julian. (2014). Biometric Antispoofing Methods: A Survey in Face Recognition. IEEE Access. 2. 1530–1552. 10.1109/ACCESS.2014.2381273. GalballyJavier MarcelSébastien FierrezJulian 2014 Biometric Antispoofing Methods: A Survey in Face Recognition IEEE Access 2 1530 1552 10.1109/ACCESS.2014.2381273 Open DOISearch in Google Scholar

(2021). One Time Password (OTP) Life Cycle and Challenges: Case Study. 10.1007/978-981-15-7961-5_13. 2021 One Time Password (OTP) Life Cycle and Challenges: Case Study 10.1007/978-981-15-7961-5_13 Open DOISearch in Google Scholar

Rubinstein-Salzedo, Simon. (2018). Zero-Knowledge Proofs. 10.1007/978-3-319-94818-8_16. Rubinstein-SalzedoSimon 2018 Zero-Knowledge Proofs 10.1007/978-3-319-94818-8_16 Open DOISearch in Google Scholar

Wollinger, Thomas & Kumar, Sandeep. (2006). Fundamentals of Symmetric Cryptography. 10.1007/3-540-28428-1_9. WollingerThomas KumarSandeep 2006 Fundamentals of Symmetric Cryptography 10.1007/3-540-28428-1_9 Open DOISearch in Google Scholar

Ranjan, Rajiv & Mukherjee, Abir & Rai, Pankaj & Ahmad, Khaleel. (2019). Asymmetric Cryptography. 10.1201/9781351021708-8. RanjanRajiv MukherjeeAbir RaiPankaj AhmadKhaleel 2019 Asymmetric Cryptography 10.1201/9781351021708-8 Open DOISearch in Google Scholar

Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Block Ciphers. 10.1002/9781118722367.ch3. FergusonNiels SchneierBruce KohnoTadayoshi 2015 Block Ciphers 10.1002/9781118722367.ch3 Open DOISearch in Google Scholar

Bray, Shannon. (2020). Stream Ciphers and Block Ciphers. 10.1002/9781119612216.ch5. BrayShannon 2020 Stream Ciphers and Block Ciphers 10.1002/9781119612216.ch5 Open DOISearch in Google Scholar

Hawanna, Varsharani & Kulkarni, Vrushali & Rane, Rashmi & Mestri, P. & Panchal, S.. (2016). Risk Rating System of X.509 Certificates. Procedia Computer Science. 89. 152–161. 10.1016/j.procs.2016.06.027. HawannaVarsharani KulkarniVrushali RaneRashmi MestriP. PanchalS. 2016 Risk Rating System of X.509 Certificates Procedia Computer Science 89 152 161 10.1016/j.procs.2016.06.027 Open DOISearch in Google Scholar

Rhodes, Brandon & Goerzen, John. (2014). TLS/SSL. 10.1007/978-1-4302-5855-1_6. RhodesBrandon GoerzenJohn 2014 TLS/SSL 10.1007/978-1-4302-5855-1_6 Open DOISearch in Google Scholar

Ferrer, Marita & Gary Gutiérrez, Margarita & Hernández, Salvador. (2019). Representation of group isomorphisms I. Topology and its Applications. 263. 10.1016/j.topol.2019.05.023. FerrerMarita Gary GutiérrezMargarita HernándezSalvador 2019 Representation of group isomorphisms I Topology and its Applications 263 10.1016/j.topol.2019.05.023 Open DOISearch in Google Scholar

Jassim S.A., Farhan A.K., Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things (2022), International Journal of Electrical and Computer Engineering, 12 (3), pp. 3287–3297, DOI: 10.11591/ijece.v12i3.pp3287-3297 JassimS.A. FarhanA.K. Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things 2022 International Journal of Electrical and Computer Engineering 12 3 3287 3297 10.11591/ijece.v12i3.pp3287-3297 Open DOISearch in Google Scholar

Shrihari M.R., Manjunath T.N., Archana R.A., Hegadi R.S., Development of Security Performance and Comparative Analyses Process for Big Data in Cloud (2022), 789, pp. 147–160. ShrihariM.R. ManjunathT.N. ArchanaR.A. HegadiR.S. Development of Security Performance and Comparative Analyses Process for Big Data in Cloud 2022 789 147 160 Search in Google Scholar

Lopriore L., Cryptographic pointers for fine-grained file access security (2022), DOI: 10.1080/19393555.2022.2033365 LoprioreL. Cryptographic pointers for fine-grained file access security 2022 10.1080/19393555.2022.2033365 Open DOISearch in Google Scholar

Susilabai S.S., Mahendran D.S., Peter S.J., A Trusted User Integrity-Based Privilege Access Control (UIPAC) for Secured Clouds (2022), 243, pp. 499–520, DOI: 10.1007/978-981-16-3675-2_38 SusilabaiS.S. MahendranD.S. PeterS.J. A Trusted User Integrity-Based Privilege Access Control (UIPAC) for Secured Clouds 2022 243 499 520 10.1007/978-981-16-3675-2_38 Open DOISearch in Google Scholar

Fan Q., Chen J., Shojafar M., Kumari S., He D., SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things (2022), DOI: 10.1109/TII.2022.3145584 FanQ. ChenJ. ShojafarM. KumariS. HeD. SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things 2022 10.1109/TII.2022.3145584 Open DOISearch in Google Scholar

Liu X., Guo Z., Ma J., Song Y., A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX (2022), 9 (5), pp. 3533–3547, DOI: 10.1109/JIOT.2021.3097996 LiuX. GuoZ. MaJ. SongY. A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX 2022 9 5 3533 3547 10.1109/JIOT.2021.3097996 Open DOISearch in Google Scholar

Liu X., Liu S., Han S., Gu D., Tightly CCAsecure inner product functional encryption scheme, (2022) Theoretical Computer Science, 898, pp. 1–19. LiuX. LiuS. HanS. GuD. Tightly CCAsecure inner product functional encryption scheme 2022 Theoretical Computer Science 898 1 19 Search in Google Scholar

Langue:
Anglais
Périodicité:
1 fois par an
Sujets de la revue:
Ingénierie, Présentations et aperçus, Ingénierie, autres