• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Wali A, Ravichandran H, Das S. A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures. Adv Mater 2024:e2400661. [PMID: 38373292 DOI: 10.1002/adma.202400661] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/13/2024] [Indexed: 02/21/2024]
2
Lee J, Jeong W, Lee K. Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability. Sensors (Basel) 2024;24:1229. [PMID: 38400390 PMCID: PMC10891990 DOI: 10.3390/s24041229] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/13/2023] [Revised: 02/07/2024] [Accepted: 02/09/2024] [Indexed: 02/25/2024]
3
Tissier EA, Berglund A, Johnson GJ, Sanzone ZA, Goodbread AP, Parker H, Lucas J, Kashmer D. Time Until Proof of Credentials Significantly Decreases With the Use of Blockchain Technology and the Document Management System. Cureus 2023;15:e48920. [PMID: 38106736 PMCID: PMC10725327 DOI: 10.7759/cureus.48920] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/17/2023] [Accepted: 11/15/2023] [Indexed: 12/19/2023]  Open
4
Asghar I, Khan MA, Ahmad T, Ullah S, Mansoor ul Hassan K, Buriro A. Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks. Sensors (Basel) 2023;23:7268. [PMID: 37631804 PMCID: PMC10459229 DOI: 10.3390/s23167268] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/14/2023] [Revised: 08/14/2023] [Accepted: 08/18/2023] [Indexed: 08/27/2023]
5
AbdelRaouf H, Chelloug SA, Muthanna A, Semary N, Amin K, Ibrahim M. Efficient Convolutional Neural Network-Based Keystroke Dynamics for Boosting User Authentication. Sensors 2023;23:4898. [PMID: 37430812 DOI: 10.3390/s23104898] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/22/2023] [Revised: 05/13/2023] [Accepted: 05/16/2023] [Indexed: 07/12/2023]
6
Agrawal V, Hazratifard M, Elmiligi H, Gebali F. Electrocardiogram (ECG)-Based User Authentication Using Deep Learning Algorithms. Diagnostics (Basel) 2023;13. [PMID: 36766544 DOI: 10.3390/diagnostics13030439] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/07/2022] [Revised: 01/03/2023] [Accepted: 01/11/2023] [Indexed: 01/27/2023]  Open
7
Kim K, Ryu J, Lee Y, Won D. An Improved Lightweight User Authentication Scheme for the Internet of Medical Things. Sensors (Basel) 2023;23:1122. [PMID: 36772160 PMCID: PMC9920152 DOI: 10.3390/s23031122] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2022] [Revised: 01/15/2023] [Accepted: 01/15/2023] [Indexed: 06/18/2023]
8
Hernández-Álvarez L, Barbierato E, Caputo S, Mucchi L, Hernández Encinas L. EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers. Sensors (Basel) 2022;23:186. [PMID: 36616785 PMCID: PMC9823500 DOI: 10.3390/s23010186] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/21/2022] [Revised: 12/15/2022] [Accepted: 12/20/2022] [Indexed: 06/17/2023]
9
Tyagi P, Kumari S, Alzahrani BA, Gupta A, Yang MH. An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT. Sensors (Basel) 2022;22:8793. [PMID: 36433388 PMCID: PMC9698520 DOI: 10.3390/s22228793] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/18/2022] [Revised: 11/10/2022] [Accepted: 11/10/2022] [Indexed: 06/16/2023]
10
Stergiadis C, Kostaridou VD, Veloudis S, Kazis D, Klados MA. A Personalized User Authentication System Based on EEG Signals. Sensors (Basel) 2022;22:6929. [PMID: 36146276 PMCID: PMC9503240 DOI: 10.3390/s22186929] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/14/2022] [Revised: 09/05/2022] [Accepted: 09/06/2022] [Indexed: 06/16/2023]
11
Wang X, Shi Y, Zheng K, Zhang Y, Hong W, Cao S. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes. Sensors (Basel) 2022;22:6627. [PMID: 36081085 PMCID: PMC9460698 DOI: 10.3390/s22176627] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/28/2022] [Revised: 08/21/2022] [Accepted: 08/31/2022] [Indexed: 06/15/2023]
12
Choi K, Ryu H, Kim J. Deep Residual Networks for User Authentication via Hand-Object Manipulations. Sensors (Basel) 2021;21:s21092981. [PMID: 33922833 PMCID: PMC8122988 DOI: 10.3390/s21092981] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/13/2021] [Revised: 04/05/2021] [Accepted: 04/21/2021] [Indexed: 11/16/2022]
13
Lee K, Lee SY. Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication. Entropy (Basel) 2020;22:E355. [PMID: 33286129 DOI: 10.3390/e22030355] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/09/2020] [Revised: 03/10/2020] [Accepted: 03/17/2020] [Indexed: 11/16/2022]
14
Chen CY, Hsu YC, Lin CC, Hajiyev J, Su CR, Tseng CH. Study of Out-Of-Hospital Access to HIS System: A Security Perspective. Sensors (Basel) 2019;19:E2628. [PMID: 31185624 DOI: 10.3390/s19112628] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/25/2019] [Revised: 06/05/2019] [Accepted: 06/05/2019] [Indexed: 11/18/2022]
15
Ryu J, Lee H, Kim H, Won D. Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks. Sensors (Basel) 2018;18:s18124481. [PMID: 30567374 PMCID: PMC6308603 DOI: 10.3390/s18124481] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/08/2018] [Revised: 12/12/2018] [Accepted: 12/14/2018] [Indexed: 12/02/2022]
16
Wang C, Xu G, Sun J. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks. Sensors (Basel) 2017;17:E2946. [PMID: 29257066 DOI: 10.3390/s17122946] [Citation(s) in RCA: 45] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/11/2017] [Revised: 12/01/2017] [Accepted: 12/04/2017] [Indexed: 11/16/2022]
17
Li CT, Wu TY, Chen CL, Lee CC, Chen CM. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors (Basel) 2017. [PMID: 28644381 PMCID: PMC5551096 DOI: 10.3390/s17071482] [Citation(s) in RCA: 72] [Impact Index Per Article: 10.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
18
Moon J, Lee D, Lee Y, Won D. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks. Sensors (Basel) 2017;17:s17050940. [PMID: 28441331 PMCID: PMC5461064 DOI: 10.3390/s17050940] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/08/2017] [Revised: 03/30/2017] [Accepted: 04/04/2017] [Indexed: 11/16/2022]
19
Park Y, Park Y. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks. Sensors (Basel) 2016;16:E2123. [PMID: 27983616 DOI: 10.3390/s16122123] [Citation(s) in RCA: 27] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/19/2016] [Revised: 12/09/2016] [Accepted: 12/12/2016] [Indexed: 11/17/2022]
20
Shen C, Yu T, Yuan S, Li Y, Guan X. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors (Basel) 2016;16:E345. [PMID: 27005626 DOI: 10.3390/s16030345] [Citation(s) in RCA: 37] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/07/2016] [Revised: 02/24/2016] [Accepted: 03/03/2016] [Indexed: 11/22/2022]
21
Chen H, Ge L, Xie L. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Sensors (Basel) 2015;15:17057-75. [PMID: 26184224 PMCID: PMC4541922 DOI: 10.3390/s150717057] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/07/2015] [Revised: 07/04/2015] [Accepted: 07/10/2015] [Indexed: 11/30/2022]
22
Kumar P, Lee SG, Lee HJ. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors (Basel) 2012;12:1625-47. [PMID: 22438729 PMCID: PMC3304131 DOI: 10.3390/s120201625] [Citation(s) in RCA: 102] [Impact Index Per Article: 8.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/29/2011] [Revised: 01/13/2012] [Accepted: 02/02/2012] [Indexed: 11/14/2022]
23
Kumar P, Choudhury AJ, Sain M, Lee SG, Lee HJ. RUASN: a robust user authentication framework for wireless sensor networks. Sensors (Basel) 2011;11:5020-46. [PMID: 22163888 PMCID: PMC3231354 DOI: 10.3390/s110505020] [Citation(s) in RCA: 32] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/25/2011] [Revised: 04/17/2011] [Accepted: 04/20/2011] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA