We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 1,012 results
  1. An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server

    The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of...
    Yongliu Ma, Yuqian Ma, Qingfeng Cheng in Security and Privacy in New Computing Environments
    Conference paper 2023
  2. PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

    Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...

    Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel in Cluster Computing
    Article 06 April 2024
  3. Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs

    Vehicle Ad Hoc Networks (VANETs) play a pivotal role in intelligent transportation systems, offering dynamic communication between vehicles, road...
    Apurva K. Vangujar, Alia Umrani, Paolo Palmieri in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  4. Enhancing security of biometrics based authentication framework for DRM system

    Due to current advancements in digital and Internet technologies, digital content theft has grown to a significant degree. Digital rights management...

    Purva Rewal, Dheerendra Mishra, ... Saurab Rana in Multimedia Tools and Applications
    Article 03 April 2023
  5. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures

    Over the last decade, technological advances in smart grids have permitted the modernization of legacy electricity networks. As Internet of Things...

    Samad Rostampour, Nasour Bagheri, ... Carmen Camara in The Journal of Supercomputing
    Article 20 July 2023
  6. Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card

    The password-based authentication mechanism is considered as the oldest and the most used method. It is easy to implement, and it does not require...

    Mariem Bouchaala, Cherif Ghazel, Leila Azouz Saidane in The Journal of Supercomputing
    Article 28 May 2021
  7. TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments

    A mechanism of fog computing environment is employed in order to enhance the cloud computing services toward the edge devices in a range of locations...

    Naveen Chandra Gowda, Sunilkumar S. Manvi, ... Rajkumar Buyya in The Journal of Supercomputing
    Article 30 October 2023
  8. Trusted Introductions for Secure Messaging

    Although today’s most prevalent end-to-end encrypted messaging platforms using the Signal Protocol perform opportunistic encryption and provide...
    Christelle Gloor, Adrian Perrig in Security Protocols XXVIII
    Conference paper 2023
  9. An efficient hybrid multifactor mutual authentication and session key agreement scheme for patient monitoring system using IoMT

    The Internet of Medical Things (IoMT) provides such flexibility in our society where anyone can get medical treatment at any time, from anywhere....

    Shanvendra Rai, Rituparna Paul, ... Preetisudha Meher in Multimedia Tools and Applications
    Article 25 March 2024
  10. A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN

    Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used in the health sector to continuously monitor patients’ health...

    Shanvendra Rai, Rituparna Paul, ... Gulab Sah in Journal of Grid Computing
    Article 02 February 2024
  11. Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication

    The medical cyber-physical system utilizes various Internet of Medical Things (IoMT) devices that are connected to the network for real-time...

    Sanjib Roy, Ayan Kumar Das in The Journal of Supercomputing
    Article 15 December 2023
  12. SUACC-IoT: secure unified authentication and access control system based on capability for IoT

    With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security...

    N. Sivaselvan, K. Vivekananda Bhat, ... Joel J. P. C. Rodrigues in Cluster Computing
    Article Open access 16 September 2022
  13. IFTTT-based secure smart farming monitoring system: data integrity and agricultural optimization

    Agricultural monitoring is pivotal for optimizing crop yields and farm productivity, yet traditional systems face drawbacks such as limited coverage...

    Radhika Lama, Sandip Karmakar in International Journal of Information Technology
    Article 04 June 2024
  14. Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use

    User attributes can be authenticated by an attribute-based anonymous credential while kee** the anonymity of the user. Most attribute-based...
    Kwan Yin Chan, Tsz Hon Yuen in Cryptology and Network Security
    Conference paper 2022
  15. SoK: Game-Based Security Models for Group Key Exchange

    Group key exchange (GKE) protocols let a group of users jointly establish fresh and secure key material. Many flavors of GKE have been proposed,...
    Bertram Poettering, Paul Rösler, ... Douglas Stebila in Topics in Cryptology – CT-RSA 2021
    Conference paper 2021
  16. LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment

    Due to the massive increase in the Internet of Things (IoT) devices in various applications requiring an IoT–cloud environment, the network latency...

    Mohammad Abdussami, Ruhul Amin, Satyanarayana Vollala in International Journal of Information Security
    Article 30 September 2022
  17. An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain

    With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device...

    **ngxing Chen, Qingfeng Cheng, ... **angyang Luo in Frontiers of Computer Science
    Article 22 January 2024
  18. An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment

    Multiserver authentication requires users to have only one-time registration for accessing different permissible services securely from various...

    Ashish Kumar, Hari Om in Multimedia Tools and Applications
    Article 22 January 2021
  19. A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments

    The distributed authentication of a large number of resource-constrained power terminal devices (PTDs) is crucial for ensuring the security of the...

    Siwei Li, Hui Zhang, ... Cong Wang in The Journal of Supercomputing
    Article 03 June 2024
  20. Security assessment and improvement of smart grid NIKE protocol

    Advanced metering infrastructure (AMI) is a fundamental functional module of Smart Grid that supports mutual communication between customers and...

    Tao Feng, Wentao **, ... Lu Zheng in International Journal of Information Security
    Article 31 August 2023
Did you find what you were looking for? Share feedback.