A two‐layer attack‐robust protocol for IoT healthcare security
Abstract The majority of studies in the field of developing identification and authentication protocols for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a relatively new approach in this field. EEG signal‐based authentication algorithms typically use feature ex...
Guardado en:
Autores principales: | Sharafi Afsaneh, Adabi Sepideh, Movaghar Ali, Al‐Majeed Salah |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/0c8fb478ad54471eab1fc481537fbd26 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Intelligent Data Analytics for Diagnosing Melanoma Skin Lesions via Deep Learning in IoT System
por: Shixiang Zhang, et al.
Publicado: (2021) -
Industrial Internet Federated Learning Driven by IoT Equipment ID and Blockchain
por: Xu Zhang, et al.
Publicado: (2021) -
Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
por: Yan-Yan Yang, et al.
Publicado: (2021) -
A Generative Adversarial Network Model Based on Intelligent Data Analytics for Music Emotion Recognition under IoT
por: I.-Sheng Huang, et al.
Publicado: (2021) -
A Survey of IoT Stream Query Execution Latency Optimization within Edge and Cloud
por: Fatima Abdullah, et al.
Publicado: (2021)