We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Designing secure PUF-based authentication protocols for constrained environments

    Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical...

    Sang-Woong Lee, Masoumeh Safkhani, ... Nasour Bagheri in Scientific Reports
    Article Open access 07 December 2023
  2. Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication

    With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to...

    Firas Hamila, Mohammad Hamad, ... Sebastian Steinhorst in International Journal of Information Security
    Article Open access 25 November 2023
  3. Privacy-Preserving Authentication Protocols in Vanet

    Vehicular Ad hoc Network (VANET) is a versatile and ad hoc network, where the vehicles must be authenticated before sharing any critical information....

    Himun Jyoti Nath, Hiten Choudhury in SN Computer Science
    Article 03 August 2023
  4. Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET

    An authentication protocol is one of the fundamental security mechanisms in distributed systems to ensure the integrity and trust level of the nodes...

    Anshula Gupta, Anurag Barthwal, ... Ashish Singh Parihar in Multimedia Tools and Applications
    Article 11 April 2023
  5. VANET authentication protocols: security analysis and a proposal

    Wireless communication among vehicular ad hoc network (VANET) entities is secured through cryptography, which is used for authentication as well as...

    Otto B. Piramuthu, Matthew Caesar in The Journal of Supercomputing
    Article 07 August 2022
  6. VQR: vulnerability analysis in quadratic residues-based authentication protocols

    Ensuring security and respect for users’ privacy, especially in electronic health-care systems, is an important task that is achievable by...

    Meysam Ghahramani, Hamed HaddadPajouh, ... Saru Kumari in Journal of Ambient Intelligence and Humanized Computing
    Article 10 April 2023
  7. Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review

    Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data...

    Elham Ebrahimpour, Shahram Babaie in International Journal of Information Security
    Article 12 January 2024
  8. A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?

    Secure communication has achieved a new dimension with the advent of the schemes of quantum key distribution (QKD) as in contrast with classical...

    Arindam Dutta, Anirban Pathak in Quantum Information Processing
    Article 07 November 2022
  9. Formal unlinkability analysis of message authentication protocols based on authentic channels

    In today’s technological world, low-cost devices have become a mainstream technology in the Internet-of-Thing (IoT) systems. Short-distance...

    Mahdi R. Alagheband, Atefeh Mashatan in The Journal of Supercomputing
    Article 14 December 2022
  10. An Approach for Formal Verification of Authentication Protocols

    Abstract

    Authentication protocols (APs) are one of the most important components of secure information systems. Authentication Protocols are...

    Article 01 February 2022
  11. Network Communication Encoding: A Study for Authentication Protocols

    The use of internet has increased significantly in the COVID-19 pandemic, and this has set the ground for various cyber-attacks, which are executed...

    Tejaswini Apte, Priti Kulkarni in SN Computer Science
    Article 03 February 2022
  12. Improving the performance of authentication protocols using efficient modular multi exponential technique

    Efficient and secure authentication of the user in today’s world, where most of the multimedia data is shared over the public network, is essential....

    Utkarsh Tiwari, Satyanarayana Vollala, ... Shameedha Begum in Multimedia Tools and Applications
    Article 27 June 2023
  13. Privacy-preserving continuous authentication using behavioral biometrics

    Continuous authentication modalities collect and utilize users’ sensitive data to authenticate them continuously. Such data contain information about...

    Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang in International Journal of Information Security
    Article Open access 13 July 2023
  14. E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol

    Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key...

    Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali in Iran Journal of Computer Science
    Article 18 March 2024
  15. An Improved Authentication Scheme for V2I Communication

    In the rapid growth of automated transportation systems Vehicle to Infrastructure (V2I) communication is growing in significance to guarantee the...

    D. Suresh, Prashant V. Joshi, ... K. M. Sudharshan in SN Computer Science
    Article 10 May 2024
  16. An authentication mechanism based on blockchain for IoT environment

    The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...

    Gholam Reza Zargar, Hamid Barati, Ali Barati in Cluster Computing
    Article 24 June 2024
  17. Mutual entity authentication of quantum key distribution network system using authentication qubits

    Entity authentication is crucial for ensuring secure quantum communication as it helps confirm the identity of participants before transmitting any...

    Hojoong Park, Byung Kwon Park, ... Sang-Wook Han in EPJ Quantum Technology
    Article Open access 15 November 2023
  18. Lightweight anonymous authentication and key agreement protocols for mobile edge computing

    Mobile Edge Computing (MEC), which is a product of 5G technology development, is actually a kind of edge computing form. It takes the base station as...

    Zhang Yukun, Wei Wenxue in Peer-to-Peer Networking and Applications
    Article 27 May 2022
  19. A lightweight authentication and authorization method in IoT-based medical care

    The Internet of Things has opened up new opportunities in healthcare systems. Wireless sensor nodes are used to collect and exchange health-related...

    Laleh Khajehzadeh, Hamid Barati, Ali Barati in Multimedia Tools and Applications
    Article 21 May 2024
  20. Comments on “Two Authentication and Key Agreement Protocols in WSN Environments”

    Wireless sensor network (WSN) is a self-organizing network composed of distributed sensor nodes. Its appearance has dramatically changed people’s...
    Conference paper 2023
Did you find what you were looking for? Share feedback.