scholarly journals Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’

IET Networks ◽  
2021 ◽  
Author(s):  
Azeem Irshad ◽  
Shehzad Ashraf Chaudhry
IET Networks ◽  
2019 ◽  
Vol 8 (5) ◽  
pp. 289-298 ◽  
Author(s):  
Tanmoy Maitra ◽  
Mohammad S. Obaidat ◽  
Debasis Giri ◽  
Subrata Dutta ◽  
Keshav Dahal

2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Author(s):  
H A Gautham ◽  
◽  
Dr. Ramakanth Kumar P ◽  

Authentication is a process of verifying the credibility of a user who is trying to access classified or confidential information. There is a vast unfold in the number of internet users, and the demand for IoT devices, cloud services has been increasing; it is now essential more than ever to protect the data hosted on the internet. So, the authentication process cannot be relied on single-factor static authentication methods to verify the user credentials. All devices in the market are not equipped with biometric systems, so a form of multi-factor authentication which is independent of biometrics needs to be adopted for a secure authentication system. This paper portraits a systematic architecture to verify user credentials using specific parameters, trying to unfold patterns using machine learning algorithms based on user's past login records, thus trying to provide a safer and secure authentication process for the users.


2015 ◽  
Author(s):  
Sung Jin Kim ◽  
Myung Chul Ma ◽  
Hyeon-Kyung Lee ◽  
Jong-bae Kim

2005 ◽  
Vol 10 (3) ◽  
pp. 355-370 ◽  
Author(s):  
Ana Sanz Merino ◽  
Yasuhiko Matsunaga ◽  
Manish Shah ◽  
Takashi Suzuki ◽  
Randy H. Katz

Sign in / Sign up

Export Citation Format

Share Document