Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-12 of 12
Keywords: Authentication
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
Available to Purchase
International Journal of Pervasive Computing and Communications (2024) 20 (5): 579–592.
Published: 21 September 2022
... that the energy aware routed with ACO provided feasible routing solutions for the source node that provided the sensor network at its lifetime and security at the time of authentication. Originality/value The proposed ACO is aware of energy routing protocol that has been analyzed and compared with the energy...
Journal Articles
A survey on various handover technologies in 5G network using the modular handover modules
Available to Purchase
International Journal of Pervasive Computing and Communications (2023) 19 (2): 267–290.
Published: 19 August 2021
... of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods...
Journal Articles
A novel OTP based tripartite authentication scheme
Available to Purchase
International Journal of Pervasive Computing and Communications (2022) 18 (4): 437–459.
Published: 19 August 2021
...Sajaad Ahmed Lone; Ajaz Hussain Mir Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based...
Journal Articles
Authentication-based access control approach for enhancing security in pervasive computing environments
Available to Purchase
International Journal of Pervasive Computing and Communications (2023) 19 (2): 211–232.
Published: 09 August 2021
.... To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment. Design/methodology/approach This paper aims to propose authentication-based...
Journal Articles
Privacy preserving model-based authentication and data security in cloud computing
Available to Purchase
International Journal of Pervasive Computing and Communications (2023) 19 (2): 173–190.
Published: 17 June 2021
.... Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model...
Journal Articles
State space classification of Markov password – an alphanumeric password authentication scheme for secure communication in cloud computing
Available to Purchase
International Journal of Pervasive Computing and Communications (2021) 17 (1): 121–134.
Published: 08 January 2021
...S. Vaithyasubramanian; R. Sundararajan Purpose Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in all authentication process, as the usage of computing facilities...
Journal Articles
Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack
Available to Purchase
International Journal of Pervasive Computing and Communications (2021) 17 (1): 78–88.
Published: 16 September 2020
... the user privileges. The security levels of the proposed model are compared with the existing models and provide a better performance using the Key Distribution Centre (KDC). The number of authentication and authorization levels present in the existing and proposed model is also evaluated. Design...
Journal Articles
TapOnce: a novel authentication method on smartphones
Available to Purchase
International Journal of Pervasive Computing and Communications (2018) 14 (1): 33–48.
Published: 03 April 2018
...Minori Inoue; Takefumi Ogawa Purpose Security technology on mobile devices is increasingly more important as smartphones are becoming more versatile and, thus, store more sensitive information. Among the three indispensable factors of owner authentication technologies on mobile devices, security...
Journal Articles
Performance analysis and evaluation of secure password persuasive cued click points
Available to Purchase
International Journal of Pervasive Computing and Communications (2016) 12 (4): 408–420.
Published: 07 November 2016
.... Findings Secure password persuasive cued click point (SPPCCP) is a module that facilitates authentication for the desktop-based applications and provides a single-machine licensing functionality. SPPCCP comprises little functionality to thwart attackers, such as persuasive click points with password...
Journal Articles
Lightweight security scheme for IoT applications using CoAP
Available to Purchase
International Journal of Pervasive Computing and Communications (2014) 10 (4): 372–392.
Published: 28 October 2014
... Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process. Design/methodology/approach – This paper proposes a lightweight security scheme in CoAP using Advanced Encryption...
Journal Articles
DRKH: A Power Efficient Encryption Protocol for Wireless Devices
Available to Purchase
International Journal of Pervasive Computing and Communications (2007) 2 (4): 321–331.
Published: 20 September 2007
... Protected Access (WPA) 1.0 and WPA 2.0. © Emerald Group Publishing Limited 2006 Low power devices WLAN security Dynamic re‐keying Key hopping Authentication INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2 (4), 2006. c EMERALD GROUP PUBLISHING LIMITED 321 DRKH: A Power Ef...
Journal Articles
(Dis)trust certification model for large access in a pervasive environment
Available to Purchase
International Journal of Pervasive Computing and Communications (2005) 1 (4): 289–299.
Published: 01 November 2005
...Rachid Saadi; Jean‐Marc Pierson; Lionel Brunie The challenge of pervasive computing consists in offering access to computing services anywhere and anytime with any devices. However, before it becomes a reality, the problems of access control and authentication have to be solved, among others...
