2022
DOI: 10.1007/978-3-030-89546-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…In order to communicate using encryption, two entities have to make use of the same algorithm and, in many cases, the same key [18]. Various crypto algorithms have been developed and deployed relatively well and can be broadly classified as Symmetric, Asymmetric and Hash Functions [19].…”
Section: Background To Lattice Cryptographymentioning
confidence: 99%
“…In order to communicate using encryption, two entities have to make use of the same algorithm and, in many cases, the same key [18]. Various crypto algorithms have been developed and deployed relatively well and can be broadly classified as Symmetric, Asymmetric and Hash Functions [19].…”
Section: Background To Lattice Cryptographymentioning
confidence: 99%
“…The damage could be immense and many countries are taking proactive steps to develop capabilities and build capacities for defending themselves [3]. Many countries are also taking offensive actions in cyber-space because attacks on critical infrastructure such as shutting down of power systems; water supply and so on are of serious concern, especially with respect to national security [4].…”
Section: Introductionmentioning
confidence: 99%