We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,266 results
  1. A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic

    In, 2016, the first secure color-code key exchange (SCCKE) protocol for secure mobile chat applications (MC APPs) was proposed by Hsing-Chung Chen....
    Hsing-Chung Chen, Mosiur Rahaman, Cahya Damarjati in Innovative Mobile and Internet Services in Ubiquitous Computing
    Conference paper 2021
  2. Design and FPGA Synthesis of BAN Processing Unit for Non-Archimedean Number Crunching

    This work presents the design and synthesis of a processing unit for numbers encoded according to the recently introduced BAN format. Such an...
    Federico Rossi, Lorenzo Fiaschi, ... Sergio Saponara in Applications in Electronics Pervading Industry, Environment and Society
    Conference paper 2023
  3. Implementation of iterative error detection and correction for BAN transceiver systems

    The rapid development of wireless communication technology has facilitated internal and external applications for the human body, leading to the...

    Kuang-Hao Lin, Fu-Chi Chen in Wireless Networks
    Article 05 January 2023
  4. Security Analysis of the Access Control Solution of NDN Using BAN Logic

    Named Data Networking (NDN) is a new promising architecture of information-centric networking. Traditional mechanisms of access control can no longer...

    Yuan Fei, Huibiao Zhu, Phan Cong Vinh in Mobile Networks and Applications
    Article 18 January 2020
  5. Security Analysis Based on BAN Logic

    ManyBAN logic quantum authentication schemes have been designed according to quantum key distributionQuantum Key Distribution (QKD). Scheme security...
    Tao Shang, Jianwei Liu in Secure Quantum Network Coding Theory
    Chapter 2020
  6. Proving authentication property of PUF-based mutual authentication protocol based on logic of events

    PUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs is one of the emerging research focuses. For...

    Jiawen Song, Meihua **ao, ... Haoyang Zhou in Soft Computing
    Article Open access 12 November 2021
  7. SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework

    The rapid expansion of Cyber-Physical Systems (CPS) is crucial for enhancing connectivity in the smart world. Encompassing smart homes, cities,...

    S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan in Peer-to-Peer Networking and Applications
    Article 01 June 2024
  8. RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

    The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems....

    Article Open access 31 January 2024
  9. Secret sharing based RFID protocol using ECC for TMIS

    With the moderate and constant advancement of the smart internet of things (IoT) and the propagation of 5 G correspondence innovation, the security...

    Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi in Peer-to-Peer Networking and Applications
    Article 09 January 2024
  10. Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications

    In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...

    T. Arpitha, Dharamendra Chouhan, J. Shreyas in Journal of Engineering and Applied Science
    Article Open access 03 January 2024
  11. A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

    The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based...

    Tao Wan, **g**g Ge, ... Haixia Zhao in Wireless Personal Communications
    Article 01 May 2024
  12. 3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things

    The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely...

    Article 01 March 2024
  13. Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain

    Energy Internet (EI) has emerged as a promising paradigm for integrating various smart grid technologies through the Internet to provide reliable and...

    Chahrazed Benrebbouh, Houssem Mansouri, ... Al-Sakib Khan Pathan in Peer-to-Peer Networking and Applications
    Article 25 October 2023
  14. A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor

    As Wireless Sensor Networks (WSN) uses the open channel for communication between the end users and the resource-constrained sensors; maintaining...

    Rituparna Paul, Shanvendra Rai, ... Preetisudha Meher in Peer-to-Peer Networking and Applications
    Article 22 December 2023
  15. A blockchain assisted multi-gateway authentication scheme for IIoT based on group

    The Industrial Internet of Things (IIoT) has been universally applied in all aspects of industrial production, contributing to the development of...

    **n Liu, Miao Wang, ... Ruisheng Zhang in Peer-to-Peer Networking and Applications
    Article 09 October 2022
  16. A blockchain based lightweight and secure access control framework for IoT-enabled supply chain

    To ensure safe exchange of data in IoT-enabled-supply-chain network and safeguard other security issues, IoT devices should have an access control...

    Rashmi Raj, Mohona Ghosh in Peer-to-Peer Networking and Applications
    Article 08 March 2024
  17. An improved lattice based certificateless data integrity verification techniques for cloud computing

    Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...

    Dilli Babu Salvakkam, Rajendra Pamula in Journal of Ambient Intelligence and Humanized Computing
    Article 26 April 2023
  18. Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem

    To formulate a secure and efficient user authentication scheme for wireless sensor networks(WSNs) is a complicated task, because sensors are placed...

    Gaurav Tyagi, Rahul Kumar in Peer-to-Peer Networking and Applications
    Article 17 October 2022
  19. Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system

    Rapid evolution of IoT technologies has virtually made connectivity of all the real world objects to the internet possible with the help of tiny...

    Vinod Mahor, R. Padmavathy, Santanu Chatterjee in Peer-to-Peer Networking and Applications
    Article 14 December 2023
  20. A Blockchain-Assisted Lightweight Anonymous Authentication Scheme for Medical Services in Internet of Medical Things

    Internet of medical things (IoMT) enable physicians to provide precise care on the Internet for registered patients anywhere, bringing convenience to...

    Shu Wu, Aiqing Zhang, ... Ya Gao in Wireless Personal Communications
    Article 03 May 2023
Did you find what you were looking for? Share feedback.