Academic literature on the topic 'Device sharing authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Device sharing authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Device sharing authentication"

1

P, Prabu, and Senthilnathan T. "Secured and flexible user authentication protocol for wireless sensor network." International Journal of Intelligent Unmanned Systems 8, no. 4 (2020): 253–65. http://dx.doi.org/10.1108/ijius-10-2019-0058.

Full text
Abstract:
PurposeIn wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Pr
APA, Harvard, Vancouver, ISO, and other styles
2

Kunal Gautam and Mohammad Yusuf Ali. "Blockchain-based storage system for secure document storage and sharing." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1486–97. https://doi.org/10.30574/wjaets.2025.15.3.1071.

Full text
Abstract:
The rapid expansion platforms have heightened urgency for robust authentication to protect sensitive from escalating array cyber threats. Traditional security systems increasingly insufficient, as they vulnerable to attack, including phishing brute-force attempts. In response these challenges, two-factor (2FA) has emerged as critical solution, requiring users to provide forms verification access accounts. However, many 2FA implementations significant flaws, such as inadequate end-to-end and poor synchronization, which can expose security risks. This study an open-source, fully encrypted 2FA de
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Jun, Xinhui Cao, and Zhen Guo. "Secure Marine Environment Communication: A Multiobject Authentication Protocol Based on Secret Sharing." International Journal of Intelligent Systems 2023 (February 22, 2023): 1–14. http://dx.doi.org/10.1155/2023/1814053.

Full text
Abstract:
In the field of marine communication, with the rapid development of the Internet of Things, big data, blockchain, and other new-generation information technology, marine information security is gradually being attached to more and more coastal countries, and marine information technology has ushered in epoch-making development opportunities. However, marine communication networks are open, and marine equipment is vulnerable to attacks on communication systems. On the one hand, a malicious adversary can intercept and analyze information, obtain relevant data with high probability, and even obta
APA, Harvard, Vancouver, ISO, and other styles
4

Lopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.

Full text
Abstract:
Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulne
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Li, Ching-Chun Chang, Junlan Bai, Hai-Duong Le, Chi-Cheng Chen, and Teen-Hang Meen. "Hamming Code Strategy for Medical Image Sharing." Applied System Innovation 3, no. 1 (2020): 8. http://dx.doi.org/10.3390/asi3010008.

Full text
Abstract:
In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryption and data authentication are commonly used to protect patient data, however, encryption and data authentication are computationally expensive and take time to execute on a mobile device. In addition, it is not easy for the patient details related to medical images to leak if the hacked image are not visual.Therefore, in this paper, we propose a
APA, Harvard, Vancouver, ISO, and other styles
6

Saurabh. "Security Enhancement for IoT using Mutual Authentication Based Lightweight Algorithm." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 479–505. https://doi.org/10.52783/anvi.v28.2448.

Full text
Abstract:
Internet of Things (IoT) has revolutionized communication technology by enabling seamless data exchange between devices. As the proliferation of sensors and smart devices grows, IoT services become increasingly accessible, impacting our lives in diverse areas such as homes, offices, agriculture, and healthcare. However, the widespread adoption of IoT also raises critical concerns regarding data security, device privacy, and the integrity of underlying infrastructure. To address these challenges, robust authentication mechanisms are essential. Mutual authentication between IoT devices establish
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Dae-Hwi, and Im-Yeong Lee. "Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments." Sensors 18, no. 10 (2018): 3534. http://dx.doi.org/10.3390/s18103534.

Full text
Abstract:
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing attention. Smart cities represent the ultimate convergence of the IoT, the Cloud, big data, and mobile technology. Smart homes, buildings, and factories create smart cities. In addition, the IoT finds applications in traffic control, public safety, and medical services, permitting group-based communication. As the scale of service grows, the nu
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Yifan, and Jingzhao Li. "Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography." Sensors 21, no. 18 (2021): 6084. http://dx.doi.org/10.3390/s21186084.

Full text
Abstract:
The Industrial IoT is one of the key technologies to improve industrial production efficiency. The entire production process usually involves multiple production regions and numerous smart devices (sensors and actuators). The efficiency of the Industrial IoT is limited by this strong coupling relationship between the subsystem and the sensors and actuators. In this paper, to unleash the potential of Industrial IoT, a safe and reliable data sharing mechanism of sensors and actuators is proposed. We deployed distributed identity authentication and data proxy services in various regions. In the d
APA, Harvard, Vancouver, ISO, and other styles
9

Amit, Gupta, and Arora Gaurav. "Location-based access to shared devices." Journal of Scientific and Engineering Research 8, no. 2 (2021): 274–77. https://doi.org/10.5281/zenodo.11487233.

Full text
Abstract:
In the era of digitalization, businesses seek new methods to improve security without sacrificing user experience, which has led to the use of multi-authentication in mobile applications. However, incorporating location-based authentication into mobile apps presents hurdles, particularly for large enterprises in various operating contexts. The key difficulty is the large size of machine learning (ML) models necessary for authentication, which makes over-the-air (OTA) downloads impractical owing to bandwidth and storage limitations. Furthermore, real-time authentication may fail in instances in
APA, Harvard, Vancouver, ISO, and other styles
10

Edris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. "Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif." Electronics 10, no. 13 (2021): 1608. http://dx.doi.org/10.3390/electronics10131608.

Full text
Abstract:
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Device sharing authentication"

1

Zhao, Weinan, Wenxin Li, Tao Wang, and Zhuoqun Xu. "A Palmprint Acquisition Device with Time-Sharing Light Source Used in Personal Verification." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

El Fray, Imed, Tomasz Hyla, Mirosław Kurkowski, Witold Maćków, and Jerzy Pejaś. "Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44893-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prasanna Kumar, M., N. Nalini, and Prasad Naik Hamsavath. "An Effective PUF Based Lightweight Authentication and Key Sharing Scheme for IoT Devices." In Emerging Research in Computing, Information, Communication and Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1338-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yakkala, Kavya Sri, Naga Mohith Reddy Konireddy, Kavita Agrawal, Suresh Chittineni, and P. V. G. D. Prasad Reddy. "A Decentralized, Lightweight, and Resilient Group Key Agreement Protocol Using Shamir Secret Sharing and Hash-Based Message Authentication Code for IoT Devices." In Power Energy and Secure Smart Technologies. CRC Press, 2025. https://doi.org/10.1201/9781003661917-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ehrler Frederic, Blondon Katherine, Baillon-Bigotte Dominique, and Lovis Christian. "Smartphones to Access to Patient Data in Hospital Settings: Authentication Solutions for Shared Devices." In Studies in Health Technology and Informatics. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-761-0-73.

Full text
Abstract:
Although mobile devices become more and more common in clinicians' hands, transforming them into an institutional tool to access electronic health record information at the patient's bedside still raises many questions. One of these questions is the provenance of mobile devices when these are deployed at an institutional level. Some advocate the use of personal devices, known as BYOD, for its lower cost, others favor the use of institutional devices which allow a standardization of the development, deployment and support processes. The financial disadvantage of institutional devices could be r
APA, Harvard, Vancouver, ISO, and other styles
6

V, Dinesh, and M. Banupriya. "Emerging Trends in Blockchain and IoT Innovations Shaping the Future of Secure Connected Devices." In Secured Blockchain and IoT Connected Devices through Decentralized Trust and Enhanced Data Integrity. RADemics Research Institute, 2024. https://doi.org/10.71443/9788197933653-13.

Full text
Abstract:
The integration of Blockchain technology into Internet of Things (IoT) ecosystems has emerged as a transformative approach to address critical security and privacy challenges in connected devices. This chapter explores the innovative convergence of Blockchain and IoT, focusing on the enhancement of data security, privacy, and trust through decentralized solutions. By leveraging the immutable and transparent nature of Blockchain, IoT networks can achieve secure, efficient, and automated data exchanges. The chapter delves into key Blockchain trends that are shaping IoT security, including decent
APA, Harvard, Vancouver, ISO, and other styles
7

Matthew, Ugochukwu Okwudili, Victory Chibuike Onumaku, Lateef Olawale Fatai, et al. "E-Healthcare Data Warehouse Design and Data Mining Using ML Approach." In Reshaping Healthcare with Cutting-Edge Biomedical Advancements. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-4439-2.ch013.

Full text
Abstract:
This paper conducted a thorough analysis of 5G-enabled smart electronic healthcare (e-healthcare) solutions for the Internet of Things (IoT) cloud data warehouse system design, highlighting the need for medical smart devices IoT connectivity solutions the current digital society must address. The study highlighted requirements for the effective implementation of smart e-healthcare systems for particular 5G scenarios. The study found that bimodal sensor access using an artificial neural network (ANN) computer algorithm can be used to execute data mining techniques and their applications in smar
APA, Harvard, Vancouver, ISO, and other styles
8

Nassa, Vinay Kumar, G. Santhakumar, Budesh Kanwer, N. Krishna Kumar, Binod Kumar, and Ch Raghava Prasad. "Blockchain-Enabled Secure Data Sharing and Communication in IoT Networks." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. https://doi.org/10.4018/979-8-3373-1032-9.ch007.

Full text
Abstract:
The system includes sharing and controlling access to data among Internet of Things devices using blockchain technology. The proposed system addresses trust and challenges in authentication faced in IoT networks. Its objectives encompass establishing authentication, authorization and trust for sharing data over the network. To efficiently manage access control, the system employs smart contracts with Access Control Contract. The ACC governs the access control overall, while the RC verifies the identity of users within the system, and the JC enforces a behavior judgment method to detect any use
APA, Harvard, Vancouver, ISO, and other styles
9

Nassa, Vinay Kumar, Mukta Sharma, Sonia Duggal, et al. "Securing IoT Devices for Bio-Medical Image Sharing." In Advanced Secure Transmission of Telemedicine-Based Bio-Medical Images. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-9821-0.ch012.

Full text
Abstract:
Enhanced patient care and diagnostic capabilities have been made possible as a result of the rapid integration of Internet of Things (IoT) devices in the healthcare industry. This has resulted in a transformation in the sharing of biomedical images. Nevertheless, this technological advancement also presents significant security challenges that need to be addressed in order to protect sensitive patient data. The critical security priorities for the Internet of Things (IoT) in biomedical image sharing are discussed in this chapter. Particular attention is paid to the importance of implementing r
APA, Harvard, Vancouver, ISO, and other styles
10

Kothai, G., P. Harish, S. Mugesh kannan, D. Ajinesh, and V. Sathyanarayanan. "Optimizing Data Privacy and Scalability in Health Monitoring." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch012.

Full text
Abstract:
In an era, health monitoring technologies are increasingly powered by smart devices and applications, ensuring the privacy and security of sensitive health data is a critical challenge. The chapter begins with an introduction to precise health monitoring, highlighting the importance of smart devices and mobile applications in tracking patient health. The chapter delves into the key challenges posed by the volume, sensitivity, and complexity of health data, examining privacy during data collection and sharing. The challenges is addressed by optimizing data security in health monitoring, such as
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Device sharing authentication"

1

Inagaki, Yuichi, and Ryoichi Shinkuma. "Authentication Control System for Mobile Device Sharing Based on Online Social Relationships." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alaverdyan, Yeghisabet, Suren Poghosyan, and Vahagn Poghosyans. "Edge Computing: Data Sharing and Intelligence." In 4th International Conference on Natural Language Processing and Machine Learning. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130812.

Full text
Abstract:
"The paper introduces certain timely and secure computing approaches that affect data intelligence related to methods and tools for real-time information processing. Timely solutions are achieved using local premises rather than supporting centralized servers or clouds. Computing within the network partly occurs near the physical endpoints, and this is where the edge computing paradigm comes in to help. The proposed method of the cloud optimization suggests splitting and sharing data between network data centers and local computing power. Provision of distinct paths between edge and main cloud
APA, Harvard, Vancouver, ISO, and other styles
3

Pradhan, Saumick, Nathan Wick, and Cedrick Kwuimy. "Document Sharing without Internet Connectivity during Study Abroad Programs." In 12th International Conference on Human Interaction and Emerging Technologies (IHIET 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005507.

Full text
Abstract:
With the increasing demand for study abroad trips, students and faculty require a streamlined platform to manage assignments and surveys during the trip. It is common for students studying abroad to lack a reliable internet connection, making it challenging to share and access documents efficiently. This is especially true in countries with underdeveloped areas with poor connectivity infrastructure. Our mobile application, UC Transform (originally “Woforo”, linked below) addresses this issue by offering a one-stop-shop platform for accessing all assignments without requiring an active internet
APA, Harvard, Vancouver, ISO, and other styles
4

Rajagopalan, Sundararaman, Sivaraman Rethinam, V. Lakshmi, J. Mahalakshmi, R. Ramya, and Amirtharajan Rengarajan. "Secure medical image sharing: A hardware authentication approach." In 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS). IEEE, 2017. http://dx.doi.org/10.1109/icmdcs.2017.8211695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Joshi, Akshata M., Dhanashree M. Jadhav, Nida A. Kazi, Amol N. Suryawanshi, and Jayashree Katti. "Authentication of grayscale forensic image using visual secret sharing." In 2016 Conference on Emerging Devices and Smart Systems (ICEDSS). IEEE, 2016. http://dx.doi.org/10.1109/icedss.2016.7587784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nishimura, Hideo, Yoshihiko Omori, Takao Yamashita, and Satoru Furukawa. "Secure authentication key sharing between mobile devices based on owner identity." In 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ). IEEE, 2018. http://dx.doi.org/10.1109/mobisecserv.2018.8311436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Widjaja, Gunawan. "Lightweight Anonymous Key Sharing Authentication Protocol for Resource-Constrained IoT Devices." In 2023 Second International Conference On Smart Technologies For Smart Nation (SmartTechCon). IEEE, 2023. http://dx.doi.org/10.1109/smarttechcon57526.2023.10391317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

A, Shabeena, and Kalaivani DK. "Privacy Preserving In IoT While Data Sharing Based On Blockchain." In 7th International Conference on Recent Innovations in Computer and Communication (ICRICC 23). International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/gitc3194/icricc23p8.

Full text
Abstract:
With the dramatically increasing deployment of intelligent devices, the Internet of Things (IoT) has attracted more attention and developed rapidly. It effectively collects and shares data from the surrounding environment to achieve better IoT services. For data sharing, the publish subscribe (PS) paradigm provides a loosely coupled and scalable communication model. However, due to the loosely coupled nature, it is vulnerable to many attacks, resulting in some security threats to the IoT system, but it cannot provide the basic security mechanisms such as authentication and confidentiality to e
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!