We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication

    With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to...

    Firas Hamila, Mohammad Hamad, ... Sebastian Steinhorst in International Journal of Information Security
    Article Open access 25 November 2023
  2. Privacy-Preserving Authentication Protocols in Vanet

    Vehicular Ad hoc Network (VANET) is a versatile and ad hoc network, where the vehicles must be authenticated before sharing any critical information....

    Himun Jyoti Nath, Hiten Choudhury in SN Computer Science
    Article 03 August 2023
  3. Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET

    An authentication protocol is one of the fundamental security mechanisms in distributed systems to ensure the integrity and trust level of the nodes...

    Anshula Gupta, Anurag Barthwal, ... Ashish Singh Parihar in Multimedia Tools and Applications
    Article 11 April 2023
  4. VANET authentication protocols: security analysis and a proposal

    Wireless communication among vehicular ad hoc network (VANET) entities is secured through cryptography, which is used for authentication as well as...

    Otto B. Piramuthu, Matthew Caesar in The Journal of Supercomputing
    Article 07 August 2022
  5. Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review

    Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data...

    Elham Ebrahimpour, Shahram Babaie in International Journal of Information Security
    Article 12 January 2024
  6. Formal unlinkability analysis of message authentication protocols based on authentic channels

    In today’s technological world, low-cost devices have become a mainstream technology in the Internet-of-Thing (IoT) systems. Short-distance...

    Mahdi R. Alagheband, Atefeh Mashatan in The Journal of Supercomputing
    Article 14 December 2022
  7. Network Communication Encoding: A Study for Authentication Protocols

    The use of internet has increased significantly in the COVID-19 pandemic, and this has set the ground for various cyber-attacks, which are executed...

    Tejaswini Apte, Priti Kulkarni in SN Computer Science
    Article 03 February 2022
  8. Improving the performance of authentication protocols using efficient modular multi exponential technique

    Efficient and secure authentication of the user in today’s world, where most of the multimedia data is shared over the public network, is essential....

    Utkarsh Tiwari, Satyanarayana Vollala, ... Shameedha Begum in Multimedia Tools and Applications
    Article 27 June 2023
  9. Privacy-preserving continuous authentication using behavioral biometrics

    Continuous authentication modalities collect and utilize users’ sensitive data to authenticate them continuously. Such data contain information about...

    Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang in International Journal of Information Security
    Article Open access 13 July 2023
  10. E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol

    Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key...

    Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali in Iran Journal of Computer Science
    Article 18 March 2024
  11. An Improved Authentication Scheme for V2I Communication

    In the rapid growth of automated transportation systems Vehicle to Infrastructure (V2I) communication is growing in significance to guarantee the...

    D. Suresh, Prashant V. Joshi, ... K. M. Sudharshan in SN Computer Science
    Article 10 May 2024
  12. An authentication mechanism based on blockchain for IoT environment

    The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...

    Gholam Reza Zargar, Hamid Barati, Ali Barati in Cluster Computing
    Article 24 June 2024
  13. A lightweight authentication and authorization method in IoT-based medical care

    The Internet of Things has opened up new opportunities in healthcare systems. Wireless sensor nodes are used to collect and exchange health-related...

    Laleh Khajehzadeh, Hamid Barati, Ali Barati in Multimedia Tools and Applications
    Article 21 May 2024
  14. Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration

    The Internet of Things (IoT) devices are used in almost every aspect of life to automate routine or critical tasks with great precision. The IoT...

    Ajay Chaudhary, Sateesh K Peddoju, Vikas Chouhan in Journal of Grid Computing
    Article 27 June 2023
  15. New ECC-Based IoT Authentication Protocol for Securing RFID Systems

    Nowadays, the research on security authentication for radio-frequency identification (RFID) systems has become a building block of Internet of Things...

    Hind Timouhin, Fatima Amounas, Mourade Azrour in SN Computer Science
    Article 12 October 2023
  16. PMA-KDP: privacy-preserving mutual authentication and key distribution protocol in Vehicular Ad-hoc Networks (VANETs)

    Due to technological advancement, Vehicular Ad-hoc Networks (VANETs) which are one of the forms of Mobile Ad-hoc networks (MANETs) have become one of...

    Pranav Sahu, Vinod Kumar, ... Ram Prakash in Multimedia Tools and Applications
    Article 16 March 2024
  17. Security Evaluation of Authentication Requirements in IoT Gateways

    In the Internet of Things (IoT) context, gateways are devices that play a strategic role in the communication of things with the external...

    Diego R. Gomes, Fernando A. Aires Lins, ... Marco Vieira in Journal of Network and Systems Management
    Article 21 July 2023
  18. A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture

    The emerging cloud infrastructure has escalated number of servers offering flexible and diverse remote services through public channels. However,...

    Shivangi Shukla, Sankita J. Patel in Cluster Computing
    Article 29 May 2023
  19. A password less authentication protocol for multi-server environment using physical unclonable function

    Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...

    E. Praveen Kumar, S. Priyanka in The Journal of Supercomputing
    Article 21 June 2023
  20. REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare

    Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare...

    Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari in The Journal of Supercomputing
    Article 22 November 2023
Did you find what you were looking for? Share feedback.