Academic literature on the topic 'Device sharing authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Device sharing authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Device sharing authentication"
P, Prabu, and Senthilnathan T. "Secured and flexible user authentication protocol for wireless sensor network." International Journal of Intelligent Unmanned Systems 8, no. 4 (2020): 253–65. http://dx.doi.org/10.1108/ijius-10-2019-0058.
Full textKunal Gautam and Mohammad Yusuf Ali. "Blockchain-based storage system for secure document storage and sharing." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1486–97. https://doi.org/10.30574/wjaets.2025.15.3.1071.
Full textYe, Jun, Xinhui Cao, and Zhen Guo. "Secure Marine Environment Communication: A Multiobject Authentication Protocol Based on Secret Sharing." International Journal of Intelligent Systems 2023 (February 22, 2023): 1–14. http://dx.doi.org/10.1155/2023/1814053.
Full textLopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.
Full textLi, Li, Ching-Chun Chang, Junlan Bai, Hai-Duong Le, Chi-Cheng Chen, and Teen-Hang Meen. "Hamming Code Strategy for Medical Image Sharing." Applied System Innovation 3, no. 1 (2020): 8. http://dx.doi.org/10.3390/asi3010008.
Full textSaurabh. "Security Enhancement for IoT using Mutual Authentication Based Lightweight Algorithm." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 479–505. https://doi.org/10.52783/anvi.v28.2448.
Full textLee, Dae-Hwi, and Im-Yeong Lee. "Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments." Sensors 18, no. 10 (2018): 3534. http://dx.doi.org/10.3390/s18103534.
Full textMeng, Yifan, and Jingzhao Li. "Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography." Sensors 21, no. 18 (2021): 6084. http://dx.doi.org/10.3390/s21186084.
Full textAmit, Gupta, and Arora Gaurav. "Location-based access to shared devices." Journal of Scientific and Engineering Research 8, no. 2 (2021): 274–77. https://doi.org/10.5281/zenodo.11487233.
Full textEdris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. "Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif." Electronics 10, no. 13 (2021): 1608. http://dx.doi.org/10.3390/electronics10131608.
Full textBook chapters on the topic "Device sharing authentication"
Zhao, Weinan, Wenxin Li, Tao Wang, and Zhuoqun Xu. "A Palmprint Acquisition Device with Time-Sharing Light Source Used in Personal Verification." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_104.
Full textEl Fray, Imed, Tomasz Hyla, Mirosław Kurkowski, Witold Maćków, and Jerzy Pejaś. "Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44893-9_14.
Full textPrasanna Kumar, M., N. Nalini, and Prasad Naik Hamsavath. "An Effective PUF Based Lightweight Authentication and Key Sharing Scheme for IoT Devices." In Emerging Research in Computing, Information, Communication and Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1338-8_22.
Full textYakkala, Kavya Sri, Naga Mohith Reddy Konireddy, Kavita Agrawal, Suresh Chittineni, and P. V. G. D. Prasad Reddy. "A Decentralized, Lightweight, and Resilient Group Key Agreement Protocol Using Shamir Secret Sharing and Hash-Based Message Authentication Code for IoT Devices." In Power Energy and Secure Smart Technologies. CRC Press, 2025. https://doi.org/10.1201/9781003661917-17.
Full textEhrler Frederic, Blondon Katherine, Baillon-Bigotte Dominique, and Lovis Christian. "Smartphones to Access to Patient Data in Hospital Settings: Authentication Solutions for Shared Devices." In Studies in Health Technology and Informatics. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-761-0-73.
Full textV, Dinesh, and M. Banupriya. "Emerging Trends in Blockchain and IoT Innovations Shaping the Future of Secure Connected Devices." In Secured Blockchain and IoT Connected Devices through Decentralized Trust and Enhanced Data Integrity. RADemics Research Institute, 2024. https://doi.org/10.71443/9788197933653-13.
Full textMatthew, Ugochukwu Okwudili, Victory Chibuike Onumaku, Lateef Olawale Fatai, et al. "E-Healthcare Data Warehouse Design and Data Mining Using ML Approach." In Reshaping Healthcare with Cutting-Edge Biomedical Advancements. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-4439-2.ch013.
Full textNassa, Vinay Kumar, G. Santhakumar, Budesh Kanwer, N. Krishna Kumar, Binod Kumar, and Ch Raghava Prasad. "Blockchain-Enabled Secure Data Sharing and Communication in IoT Networks." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. https://doi.org/10.4018/979-8-3373-1032-9.ch007.
Full textNassa, Vinay Kumar, Mukta Sharma, Sonia Duggal, et al. "Securing IoT Devices for Bio-Medical Image Sharing." In Advanced Secure Transmission of Telemedicine-Based Bio-Medical Images. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-9821-0.ch012.
Full textKothai, G., P. Harish, S. Mugesh kannan, D. Ajinesh, and V. Sathyanarayanan. "Optimizing Data Privacy and Scalability in Health Monitoring." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch012.
Full textConference papers on the topic "Device sharing authentication"
Inagaki, Yuichi, and Ryoichi Shinkuma. "Authentication Control System for Mobile Device Sharing Based on Online Social Relationships." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254088.
Full textAlaverdyan, Yeghisabet, Suren Poghosyan, and Vahagn Poghosyans. "Edge Computing: Data Sharing and Intelligence." In 4th International Conference on Natural Language Processing and Machine Learning. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130812.
Full textPradhan, Saumick, Nathan Wick, and Cedrick Kwuimy. "Document Sharing without Internet Connectivity during Study Abroad Programs." In 12th International Conference on Human Interaction and Emerging Technologies (IHIET 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005507.
Full textRajagopalan, Sundararaman, Sivaraman Rethinam, V. Lakshmi, J. Mahalakshmi, R. Ramya, and Amirtharajan Rengarajan. "Secure medical image sharing: A hardware authentication approach." In 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS). IEEE, 2017. http://dx.doi.org/10.1109/icmdcs.2017.8211695.
Full textJoshi, Akshata M., Dhanashree M. Jadhav, Nida A. Kazi, Amol N. Suryawanshi, and Jayashree Katti. "Authentication of grayscale forensic image using visual secret sharing." In 2016 Conference on Emerging Devices and Smart Systems (ICEDSS). IEEE, 2016. http://dx.doi.org/10.1109/icedss.2016.7587784.
Full textNishimura, Hideo, Yoshihiko Omori, Takao Yamashita, and Satoru Furukawa. "Secure authentication key sharing between mobile devices based on owner identity." In 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ). IEEE, 2018. http://dx.doi.org/10.1109/mobisecserv.2018.8311436.
Full textWidjaja, Gunawan. "Lightweight Anonymous Key Sharing Authentication Protocol for Resource-Constrained IoT Devices." In 2023 Second International Conference On Smart Technologies For Smart Nation (SmartTechCon). IEEE, 2023. http://dx.doi.org/10.1109/smarttechcon57526.2023.10391317.
Full textA, Shabeena, and Kalaivani DK. "Privacy Preserving In IoT While Data Sharing Based On Blockchain." In 7th International Conference on Recent Innovations in Computer and Communication (ICRICC 23). International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/gitc3194/icricc23p8.
Full text