Search
Search Results
-
Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture
At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal... -
A Lightweight Identification Protocol Based on Lattices
In this work we present a lightweight lattice-based identification protocol based on the CPA-secured public key encryption scheme Kyber. It is... -
Panini — Anonymous Anycast and an Instantiation
Anycast messaging (i.e., sending a message to an unspecified receiver) has long been neglected by the anonymous communication community. An anonymous... -
An anonymous authenticated key-agreement scheme for multi-server infrastructure
Due to single-time registration, the multi-server authentication provides benefit for getting services from different servers through trusted agent....
-
Admission control policy and key agreement based on anonymous identity in cloud computing
Cloud computing has completely revolutionized the concept of computing by providing users with always-accessible resources. In terms of...
-
A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment
Use of Internet-of-Things (IoT)-based wireless applications has been exponentially increased nowadays and likely to accelerate in near future. Thus,...
-
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
The incidence of cybersecurity attacks utilizing social engineering techniques has increased. Such attacks exploit the fact that in every secure... -
Analyzing Message Content
How you say something is often far more important than what you say. This saying is relevant in our digital age as more face-to-face communication is... -
Cyber Security Issues and Challenges on Non-fungible Tokens
Blockchain Technology helps buy and sell digital assets known as Non-Fungible Tokens (NFT). It is an asset that is not fungible. It is a different... -
A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network
Vehicular ad hoc network (VANET) has become an indispensable requirement in smart cities. The major applications are acquiring traffic information,...
-
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
With the fast growth of technologies like cloud computing, big data, the Internet of Things, artificial intelligence, and cyber-physical systems, the...
-
A Secure Mutual Authentication Scheme for Wireless Communication
With the rapid development of network technology, the number of mobile devices is increasing at a phenomenal speed. However, many wireless... -
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
In recent times, the research works on the integration of fog computing with blockchain to address the issues such as higher latency, single point of...
-
PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage
Updatable oblivious key management system (UOKMS) has been widely applied in reality to protect outsourced data confidentiality. We demonstrate that... -
Blockchain-based mutual authentication protocol without CA
Nowadays, most of the federation chain identity authentication adopts the certificate authentication of CA (Certification Authority) under PKI...
-
Key derivable signature and its application in blockchain stealth address
Stealth address protocol (SAP) is widely used in blockchain to achieve anonymity. In this paper, we formalize a key derivable signature scheme (KDS)...
-
Strongly Anonymous Ratcheted Key Exchange
Anonymity is an (abstract) security goal that is especially important to threatened user groups. Therefore, widely deployed communication protocols... -
Provably Secure Password-Authenticated Key Exchange Based on SIDH
Password-authenticated key exchange (PAKE) schemes are cryptographic schemes for securely establishing a shared session key between a client and a... -
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...
-
RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks
Wirelesssensor networks (WSNs) are applicable in numerous fields ranging from very common to those demanding critical security concerns. It is...