We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 1,012 results
  1. Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture

    At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal...
    Conference paper 2023
  2. A Lightweight Identification Protocol Based on Lattices

    In this work we present a lightweight lattice-based identification protocol based on the CPA-secured public key encryption scheme Kyber. It is...
    Samed Düzlü, Juliane Krämer, ... Patrick Struck in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  3. Panini — Anonymous Anycast and an Instantiation

    Anycast messaging (i.e., sending a message to an unspecified receiver) has long been neglected by the anonymous communication community. An anonymous...
    Christoph Coijanovic, Christiane Weis, Thorsten Strufe in Computer Security – ESORICS 2023
    Conference paper 2024
  4. An anonymous authenticated key-agreement scheme for multi-server infrastructure

    Due to single-time registration, the multi-server authentication provides benefit for getting services from different servers through trusted agent....

    Muhammad Arslan Akram, Zahid Ghaffar, ... Chien-Ming Chen in Human-centric Computing and Information Sciences
    Article Open access 15 May 2020
  5. Admission control policy and key agreement based on anonymous identity in cloud computing

    Cloud computing has completely revolutionized the concept of computing by providing users with always-accessible resources. In terms of...

    D. Paulraj, S. Neelakandan, ... E. Baburaj in Journal of Cloud Computing
    Article Open access 04 May 2023
  6. A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment

    Use of Internet-of-Things (IoT)-based wireless applications has been exponentially increased nowadays and likely to accelerate in near future. Thus,...

    Prasanta Kumar Roy, Ansuman Bhattacharya in The Journal of Supercomputing
    Article 07 October 2021
  7. ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment

    The incidence of cybersecurity attacks utilizing social engineering techniques has increased. Such attacks exploit the fact that in every secure...
    Ofir Cohen, Ron Bitton, ... Rami Puzis in Computer Security – ESORICS 2023
    Conference paper 2024
  8. Analyzing Message Content

    How you say something is often far more important than what you say. This saying is relevant in our digital age as more face-to-face communication is...
    Nicholas Oles in How to Catch a Phish
    Chapter 2023
  9. Cyber Security Issues and Challenges on Non-fungible Tokens

    Blockchain Technology helps buy and sell digital assets known as Non-Fungible Tokens (NFT). It is an asset that is not fungible. It is a different...
    Conference paper 2024
  10. A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network

    Vehicular ad hoc network (VANET) has become an indispensable requirement in smart cities. The major applications are acquiring traffic information,...

    Pankaj Kumar, Hari Om in The Journal of Supercomputing
    Article 22 May 2022
  11. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure

    With the fast growth of technologies like cloud computing, big data, the Internet of Things, artificial intelligence, and cyber-physical systems, the...

    Vinod Kumar, Mahmoud Shuker Mahmoud, ... Adesh Kumari in The Journal of Supercomputing
    Article 02 May 2022
  12. A Secure Mutual Authentication Scheme for Wireless Communication

    With the rapid development of network technology, the number of mobile devices is increasing at a phenomenal speed. However, many wireless...
    Jie Song, **angyu Pan, Fagen Li in Frontiers in Cyber Security
    Conference paper 2024
  13. Blockchain-assisted authentication and key agreement scheme for fog-based smart grid

    In recent times, the research works on the integration of fog computing with blockchain to address the issues such as higher latency, single point of...

    Ashish Tomar, Sachin Tripathi in Cluster Computing
    Article 25 September 2021
  14. PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud Storage

    Updatable oblivious key management system (UOKMS) has been widely applied in reality to protect outsourced data confidentiality. We demonstrate that...
    Shanshan Li, Chunxiang Xu in Information Security Practice and Experience
    Conference paper 2021
  15. Blockchain-based mutual authentication protocol without CA

    Nowadays, most of the federation chain identity authentication adopts the certificate authentication of CA (Certification Authority) under PKI...

    Yue Li, Mingcheng Xu, Gaojian Xu in The Journal of Supercomputing
    Article 17 May 2022
  16. Key derivable signature and its application in blockchain stealth address

    Stealth address protocol (SAP) is widely used in blockchain to achieve anonymity. In this paper, we formalize a key derivable signature scheme (KDS)...

    Ruida Wang, Ziyi Li, ... Kunpeng Wang in Cybersecurity
    Article Open access 30 May 2024
  17. Strongly Anonymous Ratcheted Key Exchange

    Anonymity is an (abstract) security goal that is especially important to threatened user groups. Therefore, widely deployed communication protocols...
    Benjamin Dowling, Eduard Hauck, ... Paul Rösler in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  18. Provably Secure Password-Authenticated Key Exchange Based on SIDH

    Password-authenticated key exchange (PAKE) schemes are cryptographic schemes for securely establishing a shared session key between a client and a...
    Theo Fanuela Prabowo, Chik How Tan in Information Security Applications
    Conference paper 2023
  19. Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing

    Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...

    Awaneesh Kumar Yadav, An Braeken, Manoj Misra in The Journal of Supercomputing
    Article 24 February 2023
  20. RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks

    Wirelesssensor networks (WSNs) are applicable in numerous fields ranging from very common to those demanding critical security concerns. It is...

    Deepti Singh, Bijendra Kumar, ... Pradeep Kumar Singh in Personal and Ubiquitous Computing
    Article 16 July 2021
Did you find what you were looking for? Share feedback.