Have a personal or library account? Click to login
Extended Authentication Based on Geometric Patterns and Transformations Cover

Extended Authentication Based on Geometric Patterns and Transformations

Open Access
|Nov 2024

References

  1. Gupta, Purnima & Sinha, Amit & Srivastava, Prabhat & Perti, Ashwin & Singh, Aswani. (2021). Security Implementations in IoT Using Digital Signature. 10.1007/978-981-15-4692-1_40.
  2. Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Message Authentication Codes. 10.1002/9781118722367.ch6.
  3. Galbally, Javier & Marcel, Sébastien & Fierrez, Julian. (2014). Biometric Antispoofing Methods: A Survey in Face Recognition. IEEE Access. 2. 1530–1552. 10.1109/ACCESS.2014.2381273.
  4. (2021). One Time Password (OTP) Life Cycle and Challenges: Case Study. 10.1007/978-981-15-7961-5_13.
  5. Rubinstein-Salzedo, Simon. (2018). Zero-Knowledge Proofs. 10.1007/978-3-319-94818-8_16.
  6. Wollinger, Thomas & Kumar, Sandeep. (2006). Fundamentals of Symmetric Cryptography. 10.1007/3-540-28428-1_9.
  7. Ranjan, Rajiv & Mukherjee, Abir & Rai, Pankaj & Ahmad, Khaleel. (2019). Asymmetric Cryptography. 10.1201/9781351021708-8.
  8. Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Block Ciphers. 10.1002/9781118722367.ch3.
  9. Bray, Shannon. (2020). Stream Ciphers and Block Ciphers. 10.1002/9781119612216.ch5.
  10. Hawanna, Varsharani & Kulkarni, Vrushali & Rane, Rashmi & Mestri, P. & Panchal, S.. (2016). Risk Rating System of X.509 Certificates. Procedia Computer Science. 89. 152–161. 10.1016/j.procs.2016.06.027.
  11. Rhodes, Brandon & Goerzen, John. (2014). TLS/SSL. 10.1007/978-1-4302-5855-1_6.
  12. Ferrer, Marita & Gary Gutiérrez, Margarita & Hernández, Salvador. (2019). Representation of group isomorphisms I. Topology and its Applications. 263. 10.1016/j.topol.2019.05.023.
  13. Jassim S.A., Farhan A.K., Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things (2022), International Journal of Electrical and Computer Engineering, 12 (3), pp. 3287–3297, DOI: 10.11591/ijece.v12i3.pp3287-3297
  14. Shrihari M.R., Manjunath T.N., Archana R.A., Hegadi R.S., Development of Security Performance and Comparative Analyses Process for Big Data in Cloud (2022), 789, pp. 147–160.
  15. Lopriore L., Cryptographic pointers for fine-grained file access security (2022), DOI: 10.1080/19393555.2022.2033365
  16. Susilabai S.S., Mahendran D.S., Peter S.J., A Trusted User Integrity-Based Privilege Access Control (UIPAC) for Secured Clouds (2022), 243, pp. 499–520, DOI: 10.1007/978-981-16-3675-2_38
  17. Fan Q., Chen J., Shojafar M., Kumari S., He D., SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things (2022), DOI: 10.1109/TII.2022.3145584
  18. Liu X., Guo Z., Ma J., Song Y., A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX (2022), 9 (5), pp. 3533–3547, DOI: 10.1109/JIOT.2021.3097996
  19. Liu X., Liu S., Han S., Gu D., Tightly CCAsecure inner product functional encryption scheme, (2022) Theoretical Computer Science, 898, pp. 1–19.
Language: English
Submitted on: Mar 2, 2022
Published on: Nov 26, 2024
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2024 Tomasz Krokosz, Jarogniew Rykowski, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.