Kameswara Rao et al., 2020 - Google Patents
A novel user authentication protocol using biometric data for iot networksKameswara Rao et al., 2020
View PDF- Document ID
- 6545966642129245277
- Author
- Kameswara Rao M
- Santhi S
- Publication year
- Publication venue
- Rising Threats in Expert Applications and Solutions: Proceedings of FICR-TEAS 2020
External Links
Snippet
Internet-based client authentication protocols must be strengthened to reduce attacks and security vulnerabilities that threaten the performance of apps in fast Internet distribution and cloud computing. For secure access to services, IoT safety is thus of critical importance. High …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11695576B2 (en) | Transaction verification through enhanced authentication | |
Wazid et al. | Mobile banking: evolution and threats: malware threats and security solutions | |
EP3717998B1 (en) | Extending a secure key storage for transaction confirmation and cryptocurrency | |
Macedo et al. | On the security aspects of Internet of Things: A systematic literature review | |
US10237070B2 (en) | System and method for sharing keys across authenticators | |
US10091195B2 (en) | System and method for bootstrapping a user binding | |
Tsai et al. | The application of multi-server authentication scheme in internet banking transaction environments | |
EP3738030A1 (en) | System and method for binding verifiable claims | |
Luo et al. | Lightweight three factor scheme for real-time data access in wireless sensor networks | |
Mohammed et al. | Current multi-factor of authentication: Approaches, requirements, attacks and challenges | |
Mahinderjit Singh et al. | A novel out-of-band biometrics authentication scheme for wearable devices | |
Chen et al. | A novel three-factor authentication scheme with high security for multi-server environments | |
Biswal et al. | Authenticating IoT devices with blockchain | |
Sookhak et al. | Security and privacy of smart cities: issues and challenge | |
Gola et al. | Security analysis of fog computing environment for ensuring the security and privacy of information | |
Wong et al. | An enhanced user authentication solution for mobile payment systems using wearables | |
Kameswara Rao et al. | A novel user authentication protocol using biometric data for iot networks | |
Hasan et al. | Authentication techniques in cloud and mobile cloud computing | |
Kapudasu et al. | Network device identity management using cryptography | |
Kandar et al. | Smart card based remote user authentication scheme in multi-server environment using Chebyshev chaotic map | |
Fietkau et al. | Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints | |
Kameswara Rao et al. | A Multi-factor Biometric-Based User Authentication Protocol for IoT Networks | |
Reshmi et al. | A survey of authentication methods in mobile cloud computing | |
Mupila et al. | An innovative authentication model for the enhancement of cloud security | |
Sirajuddin et al. | Malware Detection Approaches and Analysis for the Internet of Medical Things Enabled Healthcare Systems |