A privacy-preserving multi-factor authentication scheme for cloud-assisted IoMT with post-quantum security (Englisch)
- Neue Suche nach: Chen, Xiao
- Weitere Informationen zu Chen, Xiao:
- https://orcid.org/0009-0000-2209-4376
- Neue Suche nach: Wang, BaoCheng
- Neue Suche nach: Li, Haibin
- Neue Suche nach: Chen, Xiao
- Neue Suche nach: Wang, BaoCheng
- Neue Suche nach: Li, Haibin
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:A privacy-preserving multi-factor authentication scheme for cloud-assisted IoMT with post-quantum security
-
Beteiligte:
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:12.01.2024
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 81
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description modelZipperle, Michael / Zhang, Yu / Chang, Elizabeth / Dillon, Tharam et al. | 2023
-
CNN based image resizing forensics for double compressed JPEG imagesBilla, Nikhil Reddy / Das, Bibhash Pran / Biswal, Mrutyunjay / Okade, Manish et al. | 2023
-
CVTStego-Net: A convolutional vision transformer architecture for spatial image steganalysisBravo-Ortiz, Mario Alejandro / Mercado-Ruiz, Esteban / Villa-Pulgarin, Juan Pablo / Hormaza-Cardona, Carlos Angel / Quiñones-Arredondo, Sebastian / Arteaga-Arteaga, Harold Brayan / Orozco-Arias, Simon / Cardona-Morales, Oscar / Tabares-Soto, Reinel et al. | 2023
-
Approach based on STPA extended with STRIDE and LINDDUN, and blockchain to develop a mission-critical e-voting systemde Farias, Júlio César Leitão Albuquerque / Carniel, Andrei / de Melo Bezerra, Juliana / Hirata, Celso Massaki et al. | 2024
-
SRIJAN: Secure Randomized Internally Joined Adjustable Network for one-way hashingChakraborty, Abhilash / Biswas, Anupam / Khan, Ajoy Kumar et al. | 2024
-
An efficient cheating-detectable secret image sharing scheme with smaller share sizesLiu, Zuquan / Zhu, Guopu / Zhang, Yu / Zhang, Hongli / Kwong, Sam et al. | 2024
-
Object-attentional untargeted adversarial attackZhou, Chao / Wang, Yuan-Gen / Zhu, Guopu et al. | 2024
-
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon mapWong, Kuan-Wai / Yap, Wun-She / Goi, Bok-Min / Wong, Denis C.-K. / Ye, Guodong et al. | 2023
-
A privacy-preserving multi-factor authentication scheme for cloud-assisted IoMT with post-quantum securityChen, Xiao / Wang, BaoCheng / Li, Haibin et al. | 2024
-
The robustness of behavior-verification-based slider CAPTCHAsChang, Guoqin / Gao, Haichang / Pei, Ge / Luo, Sainan / Zhang, Yang / Cheng, Nuo / Tang, Yiwen / Guo, Qianwen et al. | 2024
-
A comprehensive analysis combining structural features for detection of new ransomware familiesMoreira, Caio C. / Moreira, Davi C. / Sales, Claudomiro Jr. et al. | 2024
-
Software vulnerable functions discovery based on code composite featureYuan, Xue / Lin, Guanjun / Mei, Huan / Tai, Yonghang / Zhang, Jun et al. | 2024
-
Editorial Board| 2024
-
MILP-based differential cryptanalysis on full-round shadowLi, Yanjun / Lin, Hao / Bi, Xinjie / Huo, Shanshan / Han, Yiyi et al. | 2023
-
Designing energy-aware collaborative intrusion detection in IoT networksLi, Wenjuan / Rosenberg, Philip / Glisby, Mads / Han, Michael et al. | 2024
-
On the feasibility of E2E verifiable online voting – A case study from Durga Puja trialDruliac, Horia / Bardsley, Matthew / Riches, Chris / Dunn, Christian / Harrison, Luke / Roy, Bimal / Hao, Feng et al. | 2024
-
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networksQi, Jianxiang / Zheng, Ning / Xu, Ming / Chen, Ping / Li, Wenqiang et al. | 2024
-
Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutationHe, Jinwen / Zhu, Hegui / Zhou, Xv et al. | 2024
-
Network IDS alert classification with active learning techniquesVaarandi, Risto / Guerra-Manzanares, Alejandro et al. | 2023
-
A fast NTRU software implementation based on 5-way TMVPYaman Gökce, Neslihan / Gökce, Anıl Burak / Cenk, Murat et al. | 2023
-
A reversible data hiding method based on bitmap prediction for AMBTC compressed hyperspectral imagesZhang, Xiaoran / Pan, Zhibin / Zhou, Quan / Fan, Guojun / Dong, Jing et al. | 2023
-
Encryption-based sub-string matching for privacy-preserving record linkageVaiwsri, Sirintra / Ranbaduge, Thilina / Christen, Peter et al. | 2024
-
An efficient quantum-resistant undeniable signature protocol for the E-voting systemLi, Quanrun / He, Debiao / Chen, Yitao / Wen, Jiaming / Yang, Zhichao et al. | 2024
-
An explainable deepfake of speech detection method with spectrograms and waveformsYu, Ning / Chen, Long / Leng, Tao / Chen, Zigang / Yi, Xiaoyin et al. | 2024