Search
Search Results
-
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to...
-
Privacy-Preserving Authentication Protocols in Vanet
Vehicular Ad hoc Network (VANET) is a versatile and ad hoc network, where the vehicles must be authenticated before sharing any critical information....
-
Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET
An authentication protocol is one of the fundamental security mechanisms in distributed systems to ensure the integrity and trust level of the nodes...
-
VANET authentication protocols: security analysis and a proposal
Wireless communication among vehicular ad hoc network (VANET) entities is secured through cryptography, which is used for authentication as well as...
-
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review
Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data...
-
Formal unlinkability analysis of message authentication protocols based on authentic channels
In today’s technological world, low-cost devices have become a mainstream technology in the Internet-of-Thing (IoT) systems. Short-distance...
-
Network Communication Encoding: A Study for Authentication Protocols
The use of internet has increased significantly in the COVID-19 pandemic, and this has set the ground for various cyber-attacks, which are executed...
-
Improving the performance of authentication protocols using efficient modular multi exponential technique
Efficient and secure authentication of the user in today’s world, where most of the multimedia data is shared over the public network, is essential....
-
Privacy-preserving continuous authentication using behavioral biometrics
Continuous authentication modalities collect and utilize users’ sensitive data to authenticate them continuously. Such data contain information about...
-
E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key...
-
An Improved Authentication Scheme for V2I Communication
In the rapid growth of automated transportation systems Vehicle to Infrastructure (V2I) communication is growing in significance to guarantee the...
-
An authentication mechanism based on blockchain for IoT environment
The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...
-
A lightweight authentication and authorization method in IoT-based medical care
The Internet of Things has opened up new opportunities in healthcare systems. Wireless sensor nodes are used to collect and exchange health-related...
-
Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
The Internet of Things (IoT) devices are used in almost every aspect of life to automate routine or critical tasks with great precision. The IoT...
-
New ECC-Based IoT Authentication Protocol for Securing RFID Systems
Nowadays, the research on security authentication for radio-frequency identification (RFID) systems has become a building block of Internet of Things...
-
PMA-KDP: privacy-preserving mutual authentication and key distribution protocol in Vehicular Ad-hoc Networks (VANETs)
Due to technological advancement, Vehicular Ad-hoc Networks (VANETs) which are one of the forms of Mobile Ad-hoc networks (MANETs) have become one of...
-
Security Evaluation of Authentication Requirements in IoT Gateways
In the Internet of Things (IoT) context, gateways are devices that play a strategic role in the communication of things with the external...
-
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
The emerging cloud infrastructure has escalated number of servers offering flexible and diverse remote services through public channels. However,...
-
A password less authentication protocol for multi-server environment using physical unclonable function
Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...
-
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare
Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare...