Near-field communication sensors

Z Cao, P Chen, Z Ma, S Li, X Gao, R Wu, L Pan, Y Shi - Sensors, 2019 - mdpi.com
Near-field communication is a new kind of low-cost wireless communication technology
developed in recent years, which brings great convenience to daily life activities such as …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

Reconfigurable metasurfaces with mechanical actuations: towards flexible and tunable photonic devices

Z Guanxing, Z Liu, W Deng, W Zhu - Journal of Optics, 2020 - iopscience.iop.org
Flexible and tunable devices have, for decades, been the subject of many research areas,
including, integrated systems, flexible electronics and photonics, which are calling for …

Hash-MAC-DSDV: Mutual authentication for intelligent IoT-based cyber–physical systems

M Adil, MA Jan, S Mastorakis, H Song… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Cyber–physical systems (CPS) connected in the form of Internet of Things (IoT) are
vulnerable to various security threats, due to the infrastructure-less deployment of IoT …

A Secure Two‐Factor Authentication Framework in Cloud Computing

S Kaur, G Kaur, M Shabaz - Security and Communication …, 2022 - Wiley Online Library
Cloud computing technology has brought tremendous evaluation in the arena of IT
(information technology). This technology paves the path of starting business with lowest …

EAKE-WC: Efficient and anonymous authenticated key exchange scheme for wearable computing

S Tu, A Badshah, H Alasmary… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Wearable computing has shown tremendous potential to revolutionize and uplift the
standard of our lives. However, researchers and field experts have often noted several …

A PUF-based anonymous authentication protocol for wireless medical sensor networks

X Shao, Y Guo, Y Guo - Wireless Networks, 2022 - Springer
Wireless medical sensor networks (WMSNs) play a major role in remote medical monitoring
systems. Generally, in a WMSN, professionals need to obtain real-time physiological data of …

Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs

D Wang, P Wang, C Wang - ACM Transactions on Cyber-Physical …, 2020 - dl.acm.org
It is challenging to design a secure and efficient multi-factor authentication scheme for real-
time data access in wireless sensor networks. On the one hand, such real-time applications …

Optimized fuzzy commitment based key agreement protocol for wireless body area network

Q Jiang, Z Chen, J Ma, X Ma, J Shen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Wireless body area networks composed of wearable devices have increasingly become an
integral part of personal health monitoring and medical assistance. A series of key …

An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances

R Martínez-Peláez, H Toral-Cruz, JR Parra-Michel… - Sensors, 2019 - mdpi.com
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to
enhance authentication protocols to reduce attacks and security vulnerabilities which affect …