Search
Search Results
-
A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic
In, 2016, the first secure color-code key exchange (SCCKE) protocol for secure mobile chat applications (MC APPs) was proposed by Hsing-Chung Chen.... -
Design and FPGA Synthesis of BAN Processing Unit for Non-Archimedean Number Crunching
This work presents the design and synthesis of a processing unit for numbers encoded according to the recently introduced BAN format. Such an... -
Implementation of iterative error detection and correction for BAN transceiver systems
The rapid development of wireless communication technology has facilitated internal and external applications for the human body, leading to the...
-
Security Analysis of the Access Control Solution of NDN Using BAN Logic
Named Data Networking (NDN) is a new promising architecture of information-centric networking. Traditional mechanisms of access control can no longer...
-
Security Analysis Based on BAN Logic
ManyBAN logic quantum authentication schemes have been designed according to quantum key distributionQuantum Key Distribution (QKD). Scheme security... -
Proving authentication property of PUF-based mutual authentication protocol based on logic of events
PUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs is one of the emerging research focuses. For...
-
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework
The rapid expansion of Cyber-Physical Systems (CPS) is crucial for enhancing connectivity in the smart world. Encompassing smart homes, cities,...
-
RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data
The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems....
-
Secret sharing based RFID protocol using ECC for TMIS
With the moderate and constant advancement of the smart internet of things (IoT) and the propagation of 5 G correspondence innovation, the security...
-
Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...
-
A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices
The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based...
-
3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things
The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely...
-
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
Energy Internet (EI) has emerged as a promising paradigm for integrating various smart grid technologies through the Internet to provide reliable and...
-
A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
As Wireless Sensor Networks (WSN) uses the open channel for communication between the end users and the resource-constrained sensors; maintaining...
-
A blockchain assisted multi-gateway authentication scheme for IIoT based on group
The Industrial Internet of Things (IIoT) has been universally applied in all aspects of industrial production, contributing to the development of...
-
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain
To ensure safe exchange of data in IoT-enabled-supply-chain network and safeguard other security issues, IoT devices should have an access control...
-
An improved lattice based certificateless data integrity verification techniques for cloud computing
Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...
-
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
To formulate a secure and efficient user authentication scheme for wireless sensor networks(WSNs) is a complicated task, because sensors are placed...
-
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
Rapid evolution of IoT technologies has virtually made connectivity of all the real world objects to the internet possible with the help of tiny...
-
A Blockchain-Assisted Lightweight Anonymous Authentication Scheme for Medical Services in Internet of Medical Things
Internet of medical things (IoMT) enable physicians to provide precise care on the Internet for registered patients anywhere, bringing convenience to...