[go: up one dir, main page]

Kameswara Rao et al., 2020 - Google Patents

A novel user authentication protocol using biometric data for iot networks

Kameswara Rao et al., 2020

View PDF
Document ID
6545966642129245277
Author
Kameswara Rao M
Santhi S
Publication year
Publication venue
Rising Threats in Expert Applications and Solutions: Proceedings of FICR-TEAS 2020

External Links

Snippet

Internet-based client authentication protocols must be strengthened to reduce attacks and security vulnerabilities that threaten the performance of apps in fast Internet distribution and cloud computing. For secure access to services, IoT safety is thus of critical importance. High …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
US11695576B2 (en) Transaction verification through enhanced authentication
Wazid et al. Mobile banking: evolution and threats: malware threats and security solutions
EP3717998B1 (en) Extending a secure key storage for transaction confirmation and cryptocurrency
Macedo et al. On the security aspects of Internet of Things: A systematic literature review
US10237070B2 (en) System and method for sharing keys across authenticators
US10091195B2 (en) System and method for bootstrapping a user binding
Tsai et al. The application of multi-server authentication scheme in internet banking transaction environments
EP3738030A1 (en) System and method for binding verifiable claims
Luo et al. Lightweight three factor scheme for real-time data access in wireless sensor networks
Mohammed et al. Current multi-factor of authentication: Approaches, requirements, attacks and challenges
Mahinderjit Singh et al. A novel out-of-band biometrics authentication scheme for wearable devices
Chen et al. A novel three-factor authentication scheme with high security for multi-server environments
Biswal et al. Authenticating IoT devices with blockchain
Sookhak et al. Security and privacy of smart cities: issues and challenge
Gola et al. Security analysis of fog computing environment for ensuring the security and privacy of information
Wong et al. An enhanced user authentication solution for mobile payment systems using wearables
Kameswara Rao et al. A novel user authentication protocol using biometric data for iot networks
Hasan et al. Authentication techniques in cloud and mobile cloud computing
Kapudasu et al. Network device identity management using cryptography
Kandar et al. Smart card based remote user authentication scheme in multi-server environment using Chebyshev chaotic map
Fietkau et al. Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints
Kameswara Rao et al. A Multi-factor Biometric-Based User Authentication Protocol for IoT Networks
Reshmi et al. A survey of authentication methods in mobile cloud computing
Mupila et al. An innovative authentication model for the enhancement of cloud security
Sirajuddin et al. Malware Detection Approaches and Analysis for the Internet of Medical Things Enabled Healthcare Systems