Journal articles on the topic 'Device sharing authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Device sharing authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
P, Prabu, and Senthilnathan T. "Secured and flexible user authentication protocol for wireless sensor network." International Journal of Intelligent Unmanned Systems 8, no. 4 (2020): 253–65. http://dx.doi.org/10.1108/ijius-10-2019-0058.
Full textKunal Gautam and Mohammad Yusuf Ali. "Blockchain-based storage system for secure document storage and sharing." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1486–97. https://doi.org/10.30574/wjaets.2025.15.3.1071.
Full textYe, Jun, Xinhui Cao, and Zhen Guo. "Secure Marine Environment Communication: A Multiobject Authentication Protocol Based on Secret Sharing." International Journal of Intelligent Systems 2023 (February 22, 2023): 1–14. http://dx.doi.org/10.1155/2023/1814053.
Full textLopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.
Full textLi, Li, Ching-Chun Chang, Junlan Bai, Hai-Duong Le, Chi-Cheng Chen, and Teen-Hang Meen. "Hamming Code Strategy for Medical Image Sharing." Applied System Innovation 3, no. 1 (2020): 8. http://dx.doi.org/10.3390/asi3010008.
Full textSaurabh. "Security Enhancement for IoT using Mutual Authentication Based Lightweight Algorithm." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 479–505. https://doi.org/10.52783/anvi.v28.2448.
Full textLee, Dae-Hwi, and Im-Yeong Lee. "Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments." Sensors 18, no. 10 (2018): 3534. http://dx.doi.org/10.3390/s18103534.
Full textMeng, Yifan, and Jingzhao Li. "Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography." Sensors 21, no. 18 (2021): 6084. http://dx.doi.org/10.3390/s21186084.
Full textAmit, Gupta, and Arora Gaurav. "Location-based access to shared devices." Journal of Scientific and Engineering Research 8, no. 2 (2021): 274–77. https://doi.org/10.5281/zenodo.11487233.
Full textEdris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. "Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif." Electronics 10, no. 13 (2021): 1608. http://dx.doi.org/10.3390/electronics10131608.
Full textI., Venkata Dwaraka Srihith. "Federated Frameworks: Pioneering Secure and Decentralized Authentication Systems." Journal of Advances in Computational Intelligence Theory 7, no. 1 (2024): 31–40. https://doi.org/10.5281/zenodo.13968684.
Full textUl Islam, Atowar, Samarjit Das, Aniruddha Deka, Chinmoy Bharadwaj, and Priyanka Sarma. "A BlockChain-Based IoT Data Securing and Sharing System for Attendance Management." Indian Journal Of Science And Technology 17, no. 23 (2024): 2430–43. http://dx.doi.org/10.17485/ijst/v17i23.1981.
Full textShanker, Ravi, Dr Sahil Verma, and Dr Kavita. "Analysis of information security service for internet application." International Journal of Engineering & Technology 7, no. 4.12 (2018): 58. http://dx.doi.org/10.14419/ijet.v7i4.12.20993.
Full textWang, Dong, Xiaosong Zhang, Jiang Ming, Ting Chen, Chao Wang, and Weina Niu. "Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device." Wireless Communications and Mobile Computing 2018 (July 4, 2018): 1–15. http://dx.doi.org/10.1155/2018/7849065.
Full textCorthis, P. Britto, G. P. Ramesh, Miguel García-Torres, and Roberto Ruíz. "Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm." Symmetry 16, no. 6 (2024): 726. http://dx.doi.org/10.3390/sym16060726.
Full textChan Suet Yan, Sharon, Alice Tang Su Wei, Jie Hui Bong, et al. "Authentication of IoT device with the enhancement of One-time Password (OTP)." Journal of IT in Asia 9, no. 1 (2021): 29–40. http://dx.doi.org/10.33736/jita.3841.2021.
Full textJia, Xudong, Ning Hu, Shen Su, et al. "IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things." Electronics 9, no. 4 (2020): 634. http://dx.doi.org/10.3390/electronics9040634.
Full textMüller-Maatsch, Judith, and Saskia M. van Ruth. "Handheld Devices for Food Authentication and Their Applications: A Review." Foods 10, no. 12 (2021): 2901. http://dx.doi.org/10.3390/foods10122901.
Full textXia, Yandong, Rongxin Qi, Sai Ji, Jian Shen, Tiantian Miao, and Huaqun Wang. "PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home." Wireless Communications and Mobile Computing 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/8865158.
Full textJiang, Jiahui, Tingrui Pei, Jiahao Chen, and Zhiwen Hou. "CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain." Information 16, no. 5 (2025): 394. https://doi.org/10.3390/info16050394.
Full textAtowar, Ul Islam, Das Samarjit, Deka Aniruddha, Bharadwaj Chinmoy, and Sarma Priyanka. "A BlockChain-Based IoT Data Securing and Sharing System for Attendance Management." Indian Journal of Science and Technology 17, no. 23 (2024): 2430–43. https://doi.org/10.17485/IJST/v17i23.1981.
Full textAli, Fasila, and Sheena Mathew. "An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata." PeerJ Computer Science 8 (May 25, 2022): e989. http://dx.doi.org/10.7717/peerj-cs.989.
Full textKhalid, Haqi, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, and Muhammad Akmal Chaudhary. "A New Hybrid Online and Offline Multi-Factor Cross-Domain Authentication Method for IoT Applications in the Automotive Industry." Energies 14, no. 21 (2021): 7437. http://dx.doi.org/10.3390/en14217437.
Full textYadav, Mainejar, and Ranvijay . "Emerging Trends in Visual Secret Sharing." International Journal of Engineering & Technology 7, no. 3.12 (2018): 374. http://dx.doi.org/10.14419/ijet.v7i3.12.16110.
Full textR.Kennady, Et al. "Reliable Techniques for Providing Secure Access Control for Cloud Storage on Mobile Devices." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 354–57. http://dx.doi.org/10.17762/ijritcc.v11i3.9868.
Full textEt. al., Rohit Chawla,. "Study of Security Threats and Challenges in Internet of Things Systems." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 1154–66. http://dx.doi.org/10.17762/turcomat.v12i2.1137.
Full textAlaverdyan, Yeghisabet, Suren Poghosyan, and Vahagn Poghosyans. "Confidential Computing in Edge- Cloud Hierarchy." International Journal of Computer Science and Information Technology 15, no. 03 (2023): 21–30. http://dx.doi.org/10.5121/ijcsit.2023.15302.
Full textMahalat, Mahabub Hasan, Dipankar Karmakar, Anindan Mondal, and Bibhash Sen. "PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (2022): 1–23. http://dx.doi.org/10.1145/3466682.
Full textA.Karunamurthy,, Dr. "LOCATION- BASED SECURITY FOR PREVENTING DATA EXPOSURE IN CORPORATE ENVIRNOMENT." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49363.
Full textJolin, J. S., A. Theophilus, and A. Kathirvel. "Two-factor Mutual Authentication with Fingerprint and MAC Address Validation." International Journal of Computer Network and Information Security 16, no. 6 (2024): 56–68. https://doi.org/10.5815/ijcnis.2024.06.05.
Full textLyu, Sicong. "Analysis on issues and challenges of IoT and the solution based on blockchain technology." Applied and Computational Engineering 4, no. 1 (2023): 272–78. http://dx.doi.org/10.54254/2755-2721/4/20230470.
Full textAzhar, Maytham, and Amin H. Seno. "A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment." Engineering and Technology Journal 37, no. 5A (2021): 172–80. http://dx.doi.org/10.30684/etj.37.5a.4.
Full textLi, Lulu, Huan Qu, Huaizhen Wang, et al. "A Blockchain-Based Product Traceability System with Off-Chain EPCIS and IoT Device Authentication." Sensors 22, no. 22 (2022): 8680. http://dx.doi.org/10.3390/s22228680.
Full textAlghamdi, Ahmed Mohammed. "Design and analysis of lightweight and robust authentication protocol for securing the resource constrained IIoT environment." PLOS ONE 20, no. 2 (2025): e0318064. https://doi.org/10.1371/journal.pone.0318064.
Full textS., Velmurugan, Prakash M., Neelakandan S., and Eric Ofori Martinson. "An Efficient Secure Sharing of Electronic Health Records Using IoT-Based Hyperledger Blockchain." International Journal of Intelligent Systems 2024 (March 22, 2024): 1–16. http://dx.doi.org/10.1155/2024/6995202.
Full textSchmid, Philipp, Alisa Schaffhäuser, and Rasha Kashef. "IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment." Information 14, no. 8 (2023): 437. http://dx.doi.org/10.3390/info14080437.
Full textLiu, Wei, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui, and Dong Zheng. "Secure and Efficient Smart Healthcare System Based on Federated Learning." International Journal of Intelligent Systems 2023 (February 27, 2023): 1–12. http://dx.doi.org/10.1155/2023/8017489.
Full textKravchuk, Serhii, and Iryna Kravchuk. "AUTHENTICATION OF WIRELESS SYSTEMS BASED ON A DRONE SWARM AS A COMPONENT OF THE 5G RADIO ACCESS NETWORK ARCHITECTURE." Information and Telecommunication Sciences, no. 1 (June 28, 2024): 18–27. http://dx.doi.org/10.20535/2411-2976.12024.18-27.
Full textSikirat Damilola Mustapha and Abidemi Adeleye Alabi. "A conceptual model for integrating zero trust architecture into smart transport systems for enhanced security." Open Access Research Journal of Multidisciplinary Studies 2, no. 1 (2021): 158–75. https://doi.org/10.53022/oarjms.2021.2.1.0047.
Full textAgrahari, Shaswat. "Eye Webinar: A Web-Based Communication Platform for Seamless Remote Education." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 5944–51. https://doi.org/10.22214/ijraset.2025.71621.
Full textMuthusamy, P., and T. Sheela. "Sybil Attack Detection Based on Authentication Process Using Digital Security Certificate Procedure for Data Transmission in MANET." International Journal of Engineering & Technology 7, no. 3.27 (2018): 270. http://dx.doi.org/10.14419/ijet.v7i3.27.17891.
Full textDevineni, Sreenath, and Bhargavi Gorantla. "Security and Privacy Issues in Internet of Things (IoT) Devices Using COPRAS Method." 4 2, no. 4 (2023): 15–22. http://dx.doi.org/10.46632/jdaai/2/4/3.
Full textPasha, Fairoz, and Jayapandian Natarajan. "Research on secure workload execution scheme in heterogeneous cloud environment." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 1047. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp1047-1054.
Full textFairoz, Pasha, and Natarajan Jayapandian. "Research on secure workload execution scheme in heterogeneous cloud environment." Research on secure workload execution scheme in heterogeneous cloud environment 29, no. 2 (2023): 1047–54. https://doi.org/10.11591/ijeecs.v29.i2.pp1047-1054.
Full textKorzhik, V. I., V. A. Yakovlev, B. V. Izotov, V. S. Starostin, and M. V. Buinevich. "Advance in Applied Cryptography Theory: Survey and New Results. Part 1. Key Cryptography." Proceedings of Telecommunication Universities 10, no. 4 (2024): 126–41. http://dx.doi.org/10.31854/1813-324x-2024-10-4-126-141.
Full textAmofa, Sandro, Qi Xia, Hu Xia, et al. "Blockchain-secure patient Digital Twin in healthcare using smart contracts." PLOS ONE 19, no. 2 (2024): e0286120. http://dx.doi.org/10.1371/journal.pone.0286120.
Full textPöhn, Daniela, and Wolfgang Hommel. "Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems." Security and Communication Networks 2023 (June 19, 2023): 1–30. http://dx.doi.org/10.1155/2023/5573310.
Full textS, Swetha, and Joe Prathap P M. "A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes." PeerJ Computer Science 11 (June 17, 2025): e2930. https://doi.org/10.7717/peerj-cs.2930.
Full textSujatha, S., and T. Sreenivasulu Reddy. "Robust Medical Image Watermarking and Brain TumorSegmentation Using Multi-Domain Transforms And Deep Learning." International Journal of Basic and Applied Sciences 14, no. 3 (2025): 406–17. https://doi.org/10.14419/7zws5x66.
Full textPiedrahita, Solorzano Giovanny Andrés, Gutiérrez Anderson Flórez, and Angie Paola Gordillo. "Data Security Threats On Smart Devices At Home." ARPHA Conference Abstracts 6 (June 20, 2023): e106978. https://doi.org/10.3897/aca.6.e106978.
Full text