Keywords = authentication
Number of Articles: 8
A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes
Volume 37, 7A , July 2019, , Page 290-301
Abstract
Nowadays Internet of Things (IoT) is growing to be a serious factor in numerous areas of our daily life style. Internet of Things brings different opportunities of intelligence to important ... Read More ...A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment
Volume 37, 5A , May 2019, , Page 172-180
Abstract
In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized ... Read More ...Artificial Neural Networks Based Fingerprint Authentication
Volume 33, 5A , June 2015, , Page 1255-1271
Abstract
Fingerprint authentication and recognition is an important subject that has been widely used in various applications because of its reliability and accuracy in the process of authenticating ... Read More ...Two Factor Authentication Based Generated One Time Password
Volume 33, 3B , March 2015, , Page 373-383
Abstract
This paper explains a method of how the two factors authentication implemented using software token to generateOne Time Password (OTP)to secure users accounts. The proposed method guarantees ... Read More ...Secret Sharing Scheme Based Technique for Authentication of Documents Images
Volume 32, 6B , June 2014, , Page 1092-1105
Abstract
Digital document image is a form of persevering important information, and, because of rapid technological development, it is easy to copy, counterfeit this digital document image and ... Read More ...A Proposed System for Sound Retrieval Using MAS and ANN
Volume 30, Issue 14 , August 2012, , Page 2480-2492
Abstract
As the use of sounds for computer interfaces, electronic equipment and multimedia contents, has increased, the role of sound design tools has become more important. In sound retrieval, ... Read More ...A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function
Volume 29, Issue 16 , December 2011, , Page 3291-3301
Abstract
Internet has opened new channel of communication enabling an e-mail to be sent to a relative thousands of kilometers away. This medium of communication opens doors for virtually free ... Read More ...A Secure Mobile Banking Using Kerberos Protocol
Volume 27, Issue 6 , April 2009, , Page 1127-1133