Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

Q Jiang, S Zeadally, J Ma, D He - Ieee Access, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the
components of the Internet of Things, and will become globally addressable by any entity …

User authentication using Blockchain based smart contract in role-based access control

P Kamboj, S Khare, S Pal - Peer-to-Peer Networking and Applications, 2021 - Springer
Since the last few decades, information security has become a significant challenge for
organizations' system administrators. However, the Role-Based Access Control (RBAC) …

[HTML][HTML] Towards flexible integration of 5G and IIoT technologies in industry 4.0: A practical use case

J Sasiain, A Sanz, J Astorga, E Jacob - Applied Sciences, 2020 - mdpi.com
The Industry 4.0 revolution envisions fully interconnected scenarios in the manufacturing
industry to improve the efficiency, quality, and performance of the manufacturing processes …

A new two-server authentication and key agreement protocol for accessing secure cloud services

D Chattaraj, M Sarma, AK Das - Computer Networks, 2018 - Elsevier
Emerging Cloud computing paradigm came up with the on-demand ubiquitous service
sharing facility via the Internet. In this synergy, the cloud service providers provide various …

[PDF][PDF] Literature review of authentication layer for public cloud computing: a meta-analysis

A Eldow, M Shakir, MA Talab, AK Muttar… - Journal of Theoretical …, 2006 - academia.edu
Cloud computing is a8rapidly growing technology due to its8highly flexible uses and
applications. It also has other features such as8simplicity, quick data access and …

Designing secure and efficient biometric-based access mechanism for cloud services

G Panchal, D Samanta, AK Das… - … on Cloud Computing, 2020 - ieeexplore.ieee.org
The demand for remote data storage and computation services is increasing exponentially
in our data-driven society; thus, the need for secure access to such data and services. In this …

HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform

D Chattaraj, M Sarma, AK Das, N Kumar… - IEEE …, 2018 - ieeexplore.ieee.org
Hadoop framework has been evolved to manage big data in cloud. Hadoop distributed file
system and MapReduce, the vital components of this framework, provide scalable and fault …

Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform

N Ellouze, S Rekhis, N Boudriga, M Allouche - Journal of Network and …, 2018 - Elsevier
Abstract Implantable Medical Devices are therapeutic devices designed to be surgically
implanted into the body of a patient to continuously monitor his/her physiological parameters …

Cardiac implantable medical devices forensics: Postmortem analysis of lethal attacks scenarios

N Ellouze, S Rekhis, N Boudriga, M Allouche - Digital Investigation, 2017 - Elsevier
Abstract Cardiac Implantable Medical devices (IMD) are increasingly being used by patients
to benefit from their therapeutic and life-saving functions. These medical devices are …

Expressive policy-based access control for resource-constrained devices

M Uriarte, J Astorga, E Jacob, M Huarte… - IEEE …, 2017 - ieeexplore.ieee.org
Upcoming smart scenarios enabled by the Internet of Things envision smart objects that
expose services that can adapt to user behavior or be managed with the goal of achieving …