Near-field communication sensors
Z Cao, P Chen, Z Ma, S Li, X Gao, R Wu, L Pan, Y Shi - Sensors, 2019 - mdpi.com
Near-field communication is a new kind of low-cost wireless communication technology
developed in recent years, which brings great convenience to daily life activities such as …
developed in recent years, which brings great convenience to daily life activities such as …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …
limitations that need to be addressed in order for their deployment to be more widespread …
Reconfigurable metasurfaces with mechanical actuations: towards flexible and tunable photonic devices
Flexible and tunable devices have, for decades, been the subject of many research areas,
including, integrated systems, flexible electronics and photonics, which are calling for …
including, integrated systems, flexible electronics and photonics, which are calling for …
Hash-MAC-DSDV: Mutual authentication for intelligent IoT-based cyber–physical systems
Cyber–physical systems (CPS) connected in the form of Internet of Things (IoT) are
vulnerable to various security threats, due to the infrastructure-less deployment of IoT …
vulnerable to various security threats, due to the infrastructure-less deployment of IoT …
A Secure Two‐Factor Authentication Framework in Cloud Computing
Cloud computing technology has brought tremendous evaluation in the arena of IT
(information technology). This technology paves the path of starting business with lowest …
(information technology). This technology paves the path of starting business with lowest …
EAKE-WC: Efficient and anonymous authenticated key exchange scheme for wearable computing
Wearable computing has shown tremendous potential to revolutionize and uplift the
standard of our lives. However, researchers and field experts have often noted several …
standard of our lives. However, researchers and field experts have often noted several …
A PUF-based anonymous authentication protocol for wireless medical sensor networks
X Shao, Y Guo, Y Guo - Wireless Networks, 2022 - Springer
Wireless medical sensor networks (WMSNs) play a major role in remote medical monitoring
systems. Generally, in a WMSN, professionals need to obtain real-time physiological data of …
systems. Generally, in a WMSN, professionals need to obtain real-time physiological data of …
Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs
It is challenging to design a secure and efficient multi-factor authentication scheme for real-
time data access in wireless sensor networks. On the one hand, such real-time applications …
time data access in wireless sensor networks. On the one hand, such real-time applications …
Optimized fuzzy commitment based key agreement protocol for wireless body area network
Wireless body area networks composed of wearable devices have increasingly become an
integral part of personal health monitoring and medical assistance. A series of key …
integral part of personal health monitoring and medical assistance. A series of key …
An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to
enhance authentication protocols to reduce attacks and security vulnerabilities which affect …
enhance authentication protocols to reduce attacks and security vulnerabilities which affect …