Search
Search Results
-
A mutual authentication scheme in VANET providing vehicular anonymity and tracking
Nowadays, the intelligent transportation system (ITS) has developed prosperously all over the world. As a key technique in ITS, vehicular ad-hoc...
-
MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map
Cloud services are expanding tremendously in mobile environment with the advent of wireless technology. However, privacy in accessing the cloud...
-
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
The usage of different technologies and smart devices helps people to get medical services remotely for multiple benefits. Thus, critical and...
-
Innovative supply chain network design with two-step authentication and environmentally-friendly blockchain technology
Blockchain Technology (BT) has the potential to revolutionize supply chain management by providing transparency, but it also poses significant...
-
An efficient blockchain assisted dynamic authentication scheme for geo-spatial enabled vehicular network
The primary goal of vehicular networks is to increase vehicle safety as well as transportation efficiency with the application of wireless...
-
Highly secure authentication and key agreement protocol for the internet of vehicles
In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and...
-
A new authentication and key agreement protocol for 5G wireless networks
Authentication and key agreement (AKA) protocol is an important security mechanism for access services in mobile communication systems. The 3GPP...
-
RAKS: robust authentication and key agreement scheme for satellite infrastructure
One of the network communication systems in our surroundings that has a significant influence on our day-to-day lives is the satellite network. Many...
-
The application of multi-server authentication scheme in internet banking transaction environments
Information and communication technology has altered businesses’ operations, with a host of established and new banks launching online banking...
-
Message authentication algorithm for OFDM communication systems
With the huge expansion in the telecommunications industry, the need for robust information security is becoming more critical than ever. Physical...
-
A secure n-secret based client authentication protocol for 802.11 WLANs
Authentication has strong impact on the overall security model of every information system. Various authentication techniques are available for...
-
A secure and efficient key agreement framework for critical energy infrastructure using mobile device
Internet of Energy (IoE) provides two-way communication for reform of energy utilization between service providers and consumers. To provide secure,...
-
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing...
-
On Group Ownership Delegate Protocol for RFID Systems
As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag...
-
-
IHKM: an improved hierarchical key management scheme for wireless sensor network
Wireless sensor networks (WSNs) are widely acknowledged for their potential as a robust infrastructure for collecting, processing, and transmitting...
-
Ethical Consumption and Self-authenticity in a Second-hand Luxury Fashion Industry Online Platform: A Conceptual Model of Interpretation
In the ethical consumption literature, the process of buying and selling luxury second-hand products on the online peer-to-peer platforms has... -
Enablers of blockchain adoption on supply chain with dynamic capability perspectives with ISM-MICMAC analysis
Using emerging digital technology to improve supply chain management (SCM) and remain competitive is critical for a supply chain. This paper aims to...
-
Management of National eID Infrastructure as a State-Critical Asset and Public-private Partnership: Learning from the Case of Estonia
In the management of national electronic identity (eID) infrastructure, cooperation between public and private parties becomes more and more...
-
Design issues in “a secure and efficient key agreement framework for critical energy infrastructure using mobile device”
We show that the scheme (Telecommun Syst 78:539–557, 2021) is flawed. It uses a symmetric key encryption to transfer data between vehicles and the...