Search
Search Results
-
Designing secure PUF-based authentication protocols for constrained environments
Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical...
-
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to...
-
Privacy-Preserving Authentication Protocols in Vanet
Vehicular Ad hoc Network (VANET) is a versatile and ad hoc network, where the vehicles must be authenticated before sharing any critical information....
-
Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET
An authentication protocol is one of the fundamental security mechanisms in distributed systems to ensure the integrity and trust level of the nodes...
-
VANET authentication protocols: security analysis and a proposal
Wireless communication among vehicular ad hoc network (VANET) entities is secured through cryptography, which is used for authentication as well as...
-
VQR: vulnerability analysis in quadratic residues-based authentication protocols
Ensuring security and respect for users’ privacy, especially in electronic health-care systems, is an important task that is achievable by...
-
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review
Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data...
-
A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Secure communication has achieved a new dimension with the advent of the schemes of quantum key distribution (QKD) as in contrast with classical...
-
Formal unlinkability analysis of message authentication protocols based on authentic channels
In today’s technological world, low-cost devices have become a mainstream technology in the Internet-of-Thing (IoT) systems. Short-distance...
-
An Approach for Formal Verification of Authentication Protocols
AbstractAuthentication protocols (APs) are one of the most important components of secure information systems. Authentication Protocols are...
-
Network Communication Encoding: A Study for Authentication Protocols
The use of internet has increased significantly in the COVID-19 pandemic, and this has set the ground for various cyber-attacks, which are executed...
-
Improving the performance of authentication protocols using efficient modular multi exponential technique
Efficient and secure authentication of the user in today’s world, where most of the multimedia data is shared over the public network, is essential....
-
Privacy-preserving continuous authentication using behavioral biometrics
Continuous authentication modalities collect and utilize users’ sensitive data to authenticate them continuously. Such data contain information about...
-
E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key...
-
An Improved Authentication Scheme for V2I Communication
In the rapid growth of automated transportation systems Vehicle to Infrastructure (V2I) communication is growing in significance to guarantee the...
-
An authentication mechanism based on blockchain for IoT environment
The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...
-
Mutual entity authentication of quantum key distribution network system using authentication qubits
Entity authentication is crucial for ensuring secure quantum communication as it helps confirm the identity of participants before transmitting any...
-
Lightweight anonymous authentication and key agreement protocols for mobile edge computing
Mobile Edge Computing (MEC), which is a product of 5G technology development, is actually a kind of edge computing form. It takes the base station as...
-
A lightweight authentication and authorization method in IoT-based medical care
The Internet of Things has opened up new opportunities in healthcare systems. Wireless sensor nodes are used to collect and exchange health-related...
-
Comments on “Two Authentication and Key Agreement Protocols in WSN Environments”
Wireless sensor network (WSN) is a self-organizing network composed of distributed sensor nodes. Its appearance has dramatically changed people’s...