Skip to Main Content
Keywords: Authentication
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
International Journal of Pervasive Computing and Communications (2024) 20 (5): 579–592.
Published: 21 September 2022
... that the energy aware routed with ACO provided feasible routing solutions for the source node that provided the sensor network at its lifetime and security at the time of authentication. Originality/value The proposed ACO is aware of energy routing protocol that has been analyzed and compared with the energy...
Journal Articles
International Journal of Pervasive Computing and Communications (2023) 19 (2): 267–290.
Published: 19 August 2021
... of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods...
Journal Articles
International Journal of Pervasive Computing and Communications (2022) 18 (4): 437–459.
Published: 19 August 2021
...Sajaad Ahmed Lone; Ajaz Hussain Mir Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based...
Journal Articles
International Journal of Pervasive Computing and Communications (2023) 19 (2): 211–232.
Published: 09 August 2021
.... To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment. Design/methodology/approach This paper aims to propose authentication-based...
Journal Articles
International Journal of Pervasive Computing and Communications (2023) 19 (2): 173–190.
Published: 17 June 2021
.... Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model...
Journal Articles
Journal Articles
Journal Articles
International Journal of Pervasive Computing and Communications (2018) 14 (1): 33–48.
Published: 03 April 2018
...Minori Inoue; Takefumi Ogawa Purpose Security technology on mobile devices is increasingly more important as smartphones are becoming more versatile and, thus, store more sensitive information. Among the three indispensable factors of owner authentication technologies on mobile devices, security...
Journal Articles
International Journal of Pervasive Computing and Communications (2016) 12 (4): 408–420.
Published: 07 November 2016
.... Findings Secure password persuasive cued click point (SPPCCP) is a module that facilitates authentication for the desktop-based applications and provides a single-machine licensing functionality. SPPCCP comprises little functionality to thwart attackers, such as persuasive click points with password...
Journal Articles
International Journal of Pervasive Computing and Communications (2014) 10 (4): 372–392.
Published: 28 October 2014
... Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process. Design/methodology/approach – This paper proposes a lightweight security scheme in CoAP using Advanced Encryption...
Journal Articles
International Journal of Pervasive Computing and Communications (2007) 2 (4): 321–331.
Published: 20 September 2007
... Protected Access (WPA) 1.0 and WPA 2.0. © Emerald Group Publishing Limited 2006 Low power devices WLAN security Dynamic re‐keying Key hopping Authentication INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2 (4), 2006. c EMERALD GROUP PUBLISHING LIMITED 321 DRKH: A Power Ef...
Journal Articles
International Journal of Pervasive Computing and Communications (2005) 1 (4): 289–299.
Published: 01 November 2005
...Rachid Saadi; Jean‐Marc Pierson; Lionel Brunie The challenge of pervasive computing consists in offering access to computing services anywhere and anytime with any devices. However, before it becomes a reality, the problems of access control and authentication have to be solved, among others...

or Create an Account

Close Modal
Close Modal