Skip to main content

and
Your search also matched 19 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN

Include preview-only content
  1. Article

    Open Access

    Designing secure PUF-based authentication protocols for constrained environments

    Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of ...

    Sang-Woong Lee, Masoumeh Safkhani, Quynh Le, Omed Hassan Ahmed in Scientific Reports (2023)

  2. Chapter and Conference Paper

    Another Fallen Hash-Based RFID Authentication Protocol

    In this paper, we scrutinize the security of an RFID protocol [9], which has been recently proposed, and show important vulnerabilities. Our first attack is a passive one that can disclose all secret informati...

    Julio Cesar Hernandez-Castro in Information Security Theory and Practice. … (2012)