ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1612.07206
  4. Cited By
Authentication Protocols for Internet of Things: A Comprehensive Survey

Authentication Protocols for Internet of Things: A Comprehensive Survey

21 December 2016
M. Ferrag
Leandros A. Maglaras
Helge Janicke
Jianmin Jiang
ArXiv (abs)PDFHTML

Papers citing "Authentication Protocols for Internet of Things: A Comprehensive Survey"

9 / 9 papers shown
Title
Autonomous and Collaborative Smart Home Security System (ACSHSS)
Autonomous and Collaborative Smart Home Security System (ACSHSS)
Hassan Jalil Hadi
Khaleeq un Nisa
Sheetal Harris
13
1
0
06 Sep 2023
iTieProbe: Is Your IoT Setup Secure against (Modern) Evil Twin?
Anand Agrawal
R. Maiti
14
2
0
24 Apr 2023
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for
  Multi-Server Healthcare System
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
Trupil Limbasiya
S. K. Sahay
Bharath Sridharan
11
16
0
13 Oct 2021
A novel Two-Factor HoneyToken Authentication Mechanism
A novel Two-Factor HoneyToken Authentication Mechanism
Vassilis Papaspirou
Leandros A. Maglaras
M. Ferrag
I. Kantzavelou
Helge Janicke
Christos Douligeris
36
16
0
16 Dec 2020
Automatic Device Selection and Access PolicyGeneration based on User
  Preference for IoTActivity Workflow
Automatic Device Selection and Access PolicyGeneration based on User Preference for IoTActivity Workflow
M. Al-Shaboti
Aaron Chen
I. Welch
6
8
0
13 Apr 2019
Blockchain Technologies for the Internet of Things: Research Issues and
  Challenges
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
M. Ferrag
M. Derdour
M. Mukherjee
A. Derhab
Leandros A. Maglaras
Helge Janicke
62
564
0
24 Jun 2018
Authentication schemes for Smart Mobile Devices: Threat Models,
  Countermeasures, and Open Research Issues
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
M. Ferrag
Leandros A. Maglaras
A. Derhab
Helge Janicke
79
59
0
27 Mar 2018
Internet of Cloud: Security and Privacy issues
Internet of Cloud: Security and Privacy issues
A. Cook
Michael Robinson
M. Ferrag
Leandros A. Maglaras
Ying He
Kevin I. Jones
Helge Janicke
57
58
0
01 Nov 2017
Security for 4G and 5G Cellular Networks: A Survey of Existing
  Authentication and Privacy-preserving Schemes
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
M. Ferrag
Leandros A. Maglaras
A. Argyriou
Dimitrios Kosmanos
Helge Janicke
57
218
0
14 Aug 2017
1