[1] AYUNINGGATI T, HARAHAP E P, JUNIOR R. Supply chain management, certificate management at the transportation layer security in charge of security[J]. Blockchain Frontier Technology, 2021,1(1):1-12.
[2] KAUR J, KOCHHAR T S, GANGULI S, et al. Evolution of management system certification: An overview[C]// Innovations in Information and Communication Technology Series. Springer, 2021:82-92.
[3] GUPTA D S, MAZUMDAR N, NAG A, et al. Secure data authentication and access control protocol for industrial healthcare system[J]. Journal of Ambient Intelligence and Humanized Computing, 2023(7):1-12.
[4] VENGALA D V K, KAVITHA D, KUMAR A P S. Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment[J]. Complex & Intelligent Systems, 2023,9(3):2915-2928.
[5] CUI J, CHENG F Z, ZHONG H, et al. Multi-factor based session secret key agreement for the industrial Internet of Things[J]. Ad Hoc Networks, 2023,138:47-59.
[6] KHAN A U, JAVAID N, KHAN M A, et al. A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things[J]. Cluster Computing, 2023,26(2):945-960.
[7] ITALTS O, PIERRE S, QUINTERO A. Privacy-preserving model for biometric-based authentication and key derivation function[J]. Journal of Information Security and Applications, 2023,78:1.1-1.12.
[8] FATHIMA N, BANU R, AHAMMED G F A. Integrated signing procedure based data transfer security and authentication framework for Internet of Things applications[J]. Wireless Personal Communications, 2023,130(1):401-420.
[9] KIYANI F, QURESHI K N, GHAFOOR K Z, et al. ISDA-BAN: Interoperability and security based data authentication scheme for body area network[J]. Cluster Computing, 2023,26(4):2429-2442.
[10] DOORWAR M, MALATHI P. SMNBMQR: Optimisation of sleep schedules in multimedia networks via bioinspired modelling for QoS-aware routing operations[J]. International Journal of Networking and Virtual Organisations, 2023,29(2):211-228.
[11] MISTRY J, GANESH A, RAMAKRISHNAN R, et al. IoT based congenital heart disease prediction system to amplify the authentication and data security using cloud computing[J]. European Chemical Bulletin, 2023,12:7201-7213.
[12] RAYANI P K, CHANGDER S. Continuous user authentication on smartphone via behavioral biometrics: a survey[J]. Multimedia Tools and Applications, 2023,82(2):1633-1667.
[13] DEEBAK B D, AL-TURJMAN F. Secure-user sign-in authentication for IoT-based eHealth systems[J]. Complex & Intelligent Systems, 2023,9(3):2629-2649.
[14] PATEL C, BASHIR A K, ALZUBI A A, et al. EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element[J]. Digital Communications and Networks, 2023,9(2):358-366.
[15] UPPULURI S, LAKSHMEESWARI G. Secure user authentication and key agreement scheme for IoT device access control based smart home communications[J]. Wireless Networks, 2023,29(3):1333-1354.
[16] REISINGER T, WAGNER I, BOITEN E A. Security and privacy in unified communication[J]. ACM Computing Surveys (CSUR), 2022,55(3):1-36.
[17] TAMIZHSELVAN C. A novel communication‐aware adaptive key management approach for ensuring security in IoT networks[J]. Transactions on Emerging Telecommunications Technologies, 2022,33(11):4605-4637.
[18] HSU C H. 5G, IoT, and edge computing convergence—Systems, services, and security[J]. International Journal of Communication Systems, 2023,36(1):e5373.1-e5373.3.
[19] VAN LINH D, VAN YEM V. Key generation technique based on channel characteristics for MIMO-OFDM wireless communication systems[J]. IEEE Access, 2023,11:7309-7319.
[20] GRAVES E, BEEMER A, KLIEWER J, et al. Keyless authentication for AWGN channels[J]. IEEE Transactions on Information Theory, 2022,69(1):496-519.
[21] MALINA L, SEDA P, MARTINASEK Z, et al. On security and privacy in vehicle speed-limiting services in the Internet of vehicles[J]. IEEE Intelligent Transportation Systems Magazine, 2022,15(1):8-22.
[22] EL-ZAWAWY M A, KALIYAR P, CONTI M, et al. Honey-list based authentication protocol for industrial IoT swarms[J]. Computer Communications, 2023,211:239-253.
[23] MANTHIRAMOORTHY C, KHAN K M S. Comparing several encrypted cloud storage platforms[J]. International Journal of Mathematics, Statistics, and Computer Science, 2024,2:44-62.
[24] KRISHNASAMY V, VENKATACHALAM S. An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using index-level boundary pattern convergent encryption algorithm[J]. Materials Today: Proceedings, 2023,81:931-936.
[25] AKBAR M, AHMAD I, MIRZA M, et al. Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach[J]. Cluster Computing, 2024,27(3):3683-3702.
[26] KUMAR R P, BANDANADAM S R. Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model[J]. International Journal of Information Technology, 2024,16(2):697-711.