[HTML][HTML] Authentication and identity management of IoHT devices: achievements, challenges, and future directions
Abstract The Internet of Things (IoT) paradigm serves as an enabler technology in several
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …
Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future
SF Ahmed, S Shuravi, A Bhuyian, S Afrin… - ar** several …
A survey on authentication techniques for the internet of things
A Albalawi, A Almrshed, A Badhib… - … on computer and …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a new computing paradigm that refers to interconnected physical
devices or IoT devices that contain sensors, actuators and connectivity to enable these IoT …
devices or IoT devices that contain sensors, actuators and connectivity to enable these IoT …
Pervasive healthcare Internet of Things: a survey
Thanks to the proliferation of the Internet of Things (IoT), pervasive healthcare is gaining
popularity day by day as it offers health support to patients irrespective of their location. In …
popularity day by day as it offers health support to patients irrespective of their location. In …
Authentication security level and resource optimization of computation offloading in edge computing systems
Edge computing brings computation and storage resources to the edge of the mobile
network to meet strict delay and high demanding applications. However, edge network …
network to meet strict delay and high demanding applications. However, edge network …
Authentication of symmetric cryptosystem using anti-aging controller-based true random number generator
In today's digital world, data protection is extremely important. Every company's data is a
valuable asset, so it's important to ensure that it's secured from outside threats. Information …
valuable asset, so it's important to ensure that it's secured from outside threats. Information …
An efficient leakage-resilient authenticated key exchange protocol suitable for IoT devices
AL Peng, YM Tseng, SS Huang - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Authenticated key exchange (AKE) protocol for client–server environments is a significant
cryptographic primitive that provides communication confidentiality and mutual …
cryptographic primitive that provides communication confidentiality and mutual …