A Smart Collaborative Authentication Framework for Multi-Dimensional Fine-Grained Control
暂无分享,去创建一个
Liu Chang | Fei Song | Fuhong Lin | Ying Liu | Zhengyang Ai | Ying Liu | Fuhong Lin | Fei Song | Liu Chang | Zhengyang Ai
[1] Anirban Sengupta,et al. Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CE , 2019, IEEE Transactions on Consumer Electronics.
[2] Waleed Bul’ajoul,et al. A New Architecture for Network Intrusion Detection and Prevention , 2019, IEEE Access.
[3] Jianwei Liu,et al. Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing , 2019, IEEE Access.
[4] Kim-Kwang Raymond Choo,et al. Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks , 2020, IEEE Transactions on Industrial Informatics.
[5] Duncan S. Wong,et al. Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol , 2016, Int. J. Commun. Syst..
[6] Feng Wu,et al. A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks , 2019, IEEE/ACM Transactions on Networking.
[7] Ying Chen,et al. An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks , 2019, IEEE Access.
[8] Jia Jingping,et al. Detection and Recognition of Atomic Evasions Against Network Intrusion Detection/Prevention Systems , 2019, IEEE Access.
[9] Chien-Ming Chen,et al. Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.
[10] Zhihui Du,et al. HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design , 2019, IEEE Journal on Selected Areas in Communications.
[11] Anil K. Jain,et al. Automated Latent Fingerprint Recognition , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[12] Honglong Chen,et al. Dynamic Distributed Honeypot Based on Blockchain , 2019, IEEE Access.
[13] Xiong Luo,et al. A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things , 2018, IEEE Access.
[14] Hong Wen,et al. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.
[15] Chen Li,et al. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.
[16] Hongjie Chen,et al. An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection , 2019, IEEE Access.
[17] YoHan Park,et al. Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks , 2016, Int. J. Distributed Sens. Networks.
[18] Joel J. P. C. Rodrigues,et al. Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective , 2019, IEEE Transactions on Multimedia.
[19] Hongke Zhang,et al. Modeling Space-Terrestrial Integrated Networks with Smart Collaborative Theory , 2019, IEEE Network.
[20] Baocang Wang,et al. Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability , 2019, IEEE Access.
[21] Vijayalakshmi Atluri,et al. Security analysis of ABAC under an administrative model , 2019, IET Inf. Secur..
[22] Naoto Yanai,et al. RBAC-SC: Role-Based Access Control Using Smart Contract , 2018, IEEE Access.
[23] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[24] Hongke Zhang,et al. Smart collaborative distribution for privacy enhancement in moving target defense , 2019, Inf. Sci..
[25] Wen-Tsuen Chen,et al. Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading , 2018, IEEE Internet of Things Journal.
[26] Geovane Fedrecheski,et al. Attribute-Based Access Control for the Swarm With Distributed Policy Management , 2019, IEEE Transactions on Consumer Electronics.
[27] Peilin Hong,et al. An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.
[28] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[29] Fuhong Lin,et al. A novel secure data transmission scheme in industrial internet of things , 2020, China Communications.
[30] Jianhua Chen,et al. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[31] Hongke Zhang,et al. A Smart Collaborative Charging Algorithm for Mobile Power Distribution in 5G Networks , 2018, IEEE Access.
[32] Albert Y. Zomaya,et al. NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection in Online Social Networks , 2018, IEEE Transactions on Knowledge and Data Engineering.
[33] Fei Song,et al. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios , 2018, Sensors.
[34] Tao Qin,et al. An Effective High Threating Alarm Mining Method for Cloud Security Management , 2018, IEEE Access.
[35] Muhammad Munwar Iqbal,et al. Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis , 2019, IEEE Access.
[36] Ruomei Wang,et al. An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification , 2018, IEEE Access.
[37] Keqin Li,et al. CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme , 2019, IEEE Access.
[38] Ravi S. Sandhu,et al. Mandatory Content Access Control for Privacy Protection in Information Centric Networks , 2017, IEEE Transactions on Dependable and Secure Computing.
[39] Dariush Abbasinezhad-Mood,et al. A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud , 2019, IEEE Transactions on Parallel and Distributed Systems.
[40] Jiguo Yu,et al. MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks , 2019, IEEE Access.
[41] Mohammad S. Obaidat,et al. Security analysis and design of an efficient ECC-based two-factor password authentication scheme , 2016, Secur. Commun. Networks.
[42] Jing Chen,et al. A Lattice-Based Incremental Signature Scheme , 2019, IEEE Access.
[43] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.