Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such...
| Main Authors: | Li, Yunfa, Tu, Yifei, Lu, Jiawa |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2019
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/59397/ |
Similar Items
A security transmission and storage solution about sensing image for blockchain in the internet of things
by: Li, Yunfa, et al.
Published: (2020)
by: Li, Yunfa, et al.
Published: (2020)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004)
by: Green, Peter
Published: (2004)
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
Authentic assessment and the Internet: contributions within knowledge networks
by: Allen, Matthew
Published: (2009)
by: Allen, Matthew
Published: (2009)
Selling an Australian Cinderella? YouTube stories
by: Leaver, Tama
Published: (2013)
by: Leaver, Tama
Published: (2013)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Internet of things and industrial applications for precision machining
by: Benardos, Panorios, et al.
Published: (2017)
by: Benardos, Panorios, et al.
Published: (2017)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Giving virtual world learning a pedagogical boost with a gamified authentic learning design
by: Teräs, H., et al.
Published: (2014)
by: Teräs, H., et al.
Published: (2014)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
Measuring Consumer-Based Brand Authenticity
by: Napoli, Julie, et al.
Published: (2014)
by: Napoli, Julie, et al.
Published: (2014)
The implementation of authentic activities for learning: a case study
by: Baccarini, David
Published: (2004)
by: Baccarini, David
Published: (2004)
Using knowledge networks to teach online writing skills in the professional writing classroom
by: Robertson, Rachel
Published: (2012)
by: Robertson, Rachel
Published: (2012)
Designing social media into university learning: technology of collaboration or collaboration for technology?
by: Tay, E., et al.
Published: (2011)
by: Tay, E., et al.
Published: (2011)
Testing the Role of Authenticity in Cultural Tourism Consumption: A Case of Mauritius
by: Ramkissoon, Haywantee, et al.
Published: (2010)
by: Ramkissoon, Haywantee, et al.
Published: (2010)
Enhancement of student learning and attitude towards mathematics through authentic learning experiences
by: Blum, Kathleen Mary
Published: (2002)
by: Blum, Kathleen Mary
Published: (2002)
Getting real in the language classroom: developing Japanese students' communicative competence with authentic materials
by: Gilmore, Alexander
Published: (2008)
by: Gilmore, Alexander
Published: (2008)
Musical stage theory: a novel account for the ontology of musical works and the authenticity of music
by: Moruzzi, Caterina
Published: (2018)
by: Moruzzi, Caterina
Published: (2018)
Incongruity between pedagogy of authenticity and contemporary educational apparatus: person-centred phenomenological studies
by: Plust, Urszula
Published: (2023)
by: Plust, Urszula
Published: (2023)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A day in the life of things in the home
by: Crabtree, Andy, et al.
Published: (2016)
by: Crabtree, Andy, et al.
Published: (2016)
Data work: how energy advisors and clients make IoT data accountable
by: Fischer, Joel E., et al.
Published: (2017)
by: Fischer, Joel E., et al.
Published: (2017)
Contesting authentic practice and ethical authority in adventure tourism
by: Rickly, J.M., et al.
Published: (2017)
by: Rickly, J.M., et al.
Published: (2017)
Accountable Internet of things?: outline of the IoT Databox model
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Building accountability into the Internet of Things: the
IoT Databox model
by: Crabtree, Andy, et al.
Published: (2018)
by: Crabtree, Andy, et al.
Published: (2018)
Harnessing the digital records of everyday things
by: Darzentas, Dimitrios, et al.
Published: (2016)
by: Darzentas, Dimitrios, et al.
Published: (2016)
Influence of positive organisational behaviour and authentic leadership towards organisational performance: a case study
by: Chay, Guo Wei
Published: (2020)
by: Chay, Guo Wei
Published: (2020)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Avoiding the internet of insecure industrial things
by: Urquhart, Lachlan, et al.
Published: (2018)
by: Urquhart, Lachlan, et al.
Published: (2018)
The politics of protest in newspaper campaigns:
dissent, populism and the rhetoric of authenticity
by: Birks, Jen
Published: (2011)
by: Birks, Jen
Published: (2011)
Authenticity and Diversity: Enhancing Australian Hepatitis C Prevention Messages
by: Winter, R., et al.
Published: (2013)
by: Winter, R., et al.
Published: (2013)
Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
by: Rupasinghe, Prabath, et al.
Published: (2012)
by: Rupasinghe, Prabath, et al.
Published: (2012)
Operationalising gamification in an educational authentic environment
by: Reiners, Torsten, et al.
Published: (2012)
by: Reiners, Torsten, et al.
Published: (2012)
The lives of objects: designing for meaningful things
by: Darzentas, Dimitrios Paris
Published: (2018)
by: Darzentas, Dimitrios Paris
Published: (2018)
Similar Items
-
A security transmission and storage solution about sensing image for blockchain in the internet of things
by: Li, Yunfa, et al.
Published: (2020) -
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017) -
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004) -
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003) -
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)