[1] KUMAR S, JAFRI S A A, NIGAM N A, et al. A new user identity based authentication, using security and distributed for cloud computing[C]// IOP Conference Series:Materials Science and Engineering. IOP Publishing, 2020,748(1). DOI: 10.1088/1757-899X/748/1/012026.
[2] LIEN C W, VHADURI S. Challenges and opportunities of biometric user authentication in the age of IoT: A survey[J]. ACM Computing Surveys, 2023,56(1):1-37.
[3] RAYANI P K, CHANGDER S. Continuous user authentication on smartphone via behavioral biometrics: a survey[J]. Multimedia Tools and Applications, 2023,82(2):1633-1667.
[4] NIKRAVAN M, REZA A. A multi-factor user authentication and key agreement protocol based on bilinear pairing for the Internet of things[J]. Wireless Personal Communications, 2020,111(1):463-494.
[5] CHEN M, LEE T F, PAN J I. An enhanced lightweight dynamic pseudonym identity based authentication and key agreement scheme using wireless sensor networks for agriculture monitoring[J]. Sensors, 2019,19(5):1146-1159.
[6] GUPTA B B, PRAJAPATI V, NEDJAH N, et al. Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS)[J]. Neural Computing and Applications, 2023,35(7):5055-5080.
[7] MO J Q, HU Z W, SHEN W. A provably secure three-factor authentication protocol based on Chebyshev chaotic mapping for wireless sensor network[J]. IEEE Access, 2022,10:12137-12152.
[8] 金瑜瑶,张晓梅,王亚杰. 基于注意力模块的移动设备多场景持续身份认证[J]. 计算机工程与应用, 2024,60(3):280-291.
[9] KAIRALDEEN A R, ABDULLAH N F, ABU-SAMAH A, et al. Peer-to-peer user identity verification time optimization in IoT blockchain network[J]. Sensors, 2023,23(4):2106-2117.
[10] 刘鑫, 柳毅. 基于智能合约的双因素身份认证方案[J]. 计算机与现代化, 2023(10):121-126.
[11] PAN Q Q, WU J, BASHIR A K, et al. Side-channel fuzzy analysis-based AI model extraction attack with information-theoretic perspective in intelligent IoT[J]. IEEE Transactions on Fuzzy Systems, 2022,30(11):4642-4656.
[12] HADDADPAJOUH H, AZMOODEH A, DEHGHANTANHA
A, et al. MVFCC:A multi-view fuzzy consensus clustering model for malware threat attribution[J]. IEEE Access, 2020,8:139188-139198.
[13] LIU H, HAN D Z, CUI M M, et al. IdenMultiSig:Identity-based decentralized multi-signature in Internet of things[J]. IEEE Transactions on Computational Social Systems, 2023,10(4):1711-1721.
[14] ULLAH S, ZHENG J, DIN N, et al. Elliptic curve cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey[J]. Computer Science Review, 2023,47. DOI: 10.1016/j.cosrev.2022.100530.
[15] JIA X D, HU N, SU S, et al. IRBA: An identity-based cross-domain authentication scheme for the Internet of things[J]. Electronics, 2020,9(4):634-643.
[16] RANI P, SACHAN R K, KUKREJA S. Educert-chain:A secure and notarized educational certificate authentication and verification system using permissioned blockchain[J]. Cluster Computing, 2024:27(7):10169-10196.
[17] YU S J, PARK K S. ISG-SLAS:Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor[J]. Journal of Systems Architecture, 2022,131. DOI: 10.1016/j.sysarc.2022.102698.
[18] 王志伟,王煊. 一种基于SM9盲签名的OpenID协议设计方法[J]. 计算机与现代化, 2022(12):7-13.
[19] HEO J W, RAMACHANDRAN G S, DORRI A, et al. Blockchain data storage optimisations:A comprehensive survey[J]. ACM Computing Surveys, 2024,56(7):1-27.
[20] 白伊瑞,田宁,雷虹,等. 基于DID的跨链身份认证研究综述[J]. 计算机科学与探索, 2024,18(3):597-611.
[21] ABDELFATAH R I. Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity[J]. Journal of King Saud University-Computer and Information Sciences, 2024,36(5). DOI: 10.1016/j.jksuci.2024.102062.
[22] OU H H, PAN C H, TSENG Y M, et al. Decentralized identity authentication mechanism: Integrating FIDO and blockchain for enhanced security[J]. Applied Sciences, 2024,14(9):3551-3564.
[23] WU L, YANG C. IoT device identity authentication method based on rPPG and CNN facial recognition[J]. International Journal of Advanced Computer Science & Applications, 2024,15(5):265-279.
[24] WEI Z, DONG Y. Multi-WiIR: Multi-user identity legitimacy authentication based on WiFi device[J]. Future Internet, 2024,16(4):127-139.
[25] NITA S L, MIHAILESCU M I. A novel authentication scheme based on verifiable credentials using digital identity in the context of Web 3.0[J]. Electronics, 2024,13(6):1137-1149.
[26] ZHAO G S, CHEN H, WANG J. An edge-assisted group authentication scheme for the narrowband Internet of things[J]. Complex & Intelligent Systems, 2024,10:1-22.
[27] CHEN L Q, ZHU Y Q, LIU S H, et al. PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication[J]. Computer Communications, 2024,218:31-43.