We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A dynamic C-V2X anonymous authentication and group key agreement protocol

    At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named...

    Beibei Cui, Wei He, Yan Cui in International Journal of Information Security
    Article 18 June 2024
  2. AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

    The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and...

    Fatty M. Salem, Maha Safwat, ... Shahira Habashy in Journal of Cloud Computing
    Article Open access 30 August 2023
  3. Provable secure authentication key agreement for wireless body area networks

    Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...

    Yuqian Ma, Wenbo Shi, ... Qingfeng Cheng in Frontiers of Computer Science
    Article 23 December 2023
  4. An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function

    Nowadays, smart card and password-based user authentication and key agreement schemes have become an integral mechanism to ensure only legitimate...

    Gaurav Tyagi, Rahul Kumar in International Journal of Information Security
    Article 02 November 2023
  5. Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations

    Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuation capabilities, working collaboratively...

    Ajeet Singh, Vikas Tiwari, Appala Naidu Tentu in International Journal of Information Technology
    Article 16 March 2023
  6. Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing

    Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...

    Awaneesh Kumar Yadav, An Braeken, Manoj Misra in The Journal of Supercomputing
    Article 24 February 2023
  7. Multicast Key Agreement, Revisited

    Multicast Key Agreement (MKA) is a long-overlooked natural primitive of large practical interest. In traditional MKA, an omniscient group manager...
    Alexander Bienstock, Yevgeniy Dodis, Yi Tang in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  8. Fork-Resilient Continuous Group Key Agreement

    Continuous Group Key Agreement (CGKA) lets an evolving group of clients agree on a sequence of group keys. An important application of CGKA is...
    Joël Alwen, Marta Mularczyk, Yiannis Tselekounis in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  9. Cryptanalysis of a secure and efficient Diffie–Hellman based key agreement scheme

    Recently a group key agreement protocol based on the key tree and Diffie-Hellman for systems of constrained resources was proposed. We show that the...

    Payal Sharma, B. R. Purushothama in International Journal of Information Technology
    Article 20 January 2023
  10. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication

    The three party authenticated key agreement protocol assists two parties in affirming one another and agreeing on a shared session key with the...

    Uddeshaya Kumar, Manish Garg, Gautam Kaushik in Cluster Computing
    Article 08 January 2024
  11. Blockchain-Assisted Authentication and Key Agreement Protocol for Cloud-Edge Collaboration

    In response to the urgent need for scalable, lightweight, low-latency, anonymous, and highly secure identity authentication and key agreement...
    Peng Liu, Qian He, ... Ming Jiang in Blockchain and Trustworthy Systems
    Conference paper 2024
  12. Blockchain-Based Group Key Agreement

    Blockchain can provide trusted ledgers on distributed architecture without the help of any central authority. Since all the transactions are saved in...
    Conference paper 2022
  13. An efficient hybrid multifactor mutual authentication and session key agreement scheme for patient monitoring system using IoMT

    The Internet of Medical Things (IoMT) provides such flexibility in our society where anyone can get medical treatment at any time, from anywhere....

    Shanvendra Rai, Rituparna Paul, ... Preetisudha Meher in Multimedia Tools and Applications
    Article 25 March 2024
  14. A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography

    Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical...

    Yulei Chen, Jianhua Chen in Multimedia Tools and Applications
    Article 12 October 2022
  15. A construction of post quantum secure authenticated key agreement design for mobile digital rights management system

    The quantum computing being a threat motivates us to design a post quantum secure authentication protocol for mobile digital rights management...

    Pradeep Kumar Dadsena, Jainendra Jain, ... Dharminder Dharminder in Multimedia Tools and Applications
    Article 10 March 2023
  16. An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems

    Internet of Things is one of the prevalent and inevitable trends of the current era where data is found to be scattered among sensing devices. This...

    G. Umarani Srikanth, R. Geetha, S. Prabhu in International Journal of Information Technology
    Article 11 February 2023
  17. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid

    With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent...

    Cong Wang, Peng Huo, ... Yiying Zhang in Computing
    Article Open access 27 June 2023
  18. A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN

    Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used in the health sector to continuously monitor patients’ health...

    Shanvendra Rai, Rituparna Paul, ... Gulab Sah in Journal of Grid Computing
    Article 02 February 2024
  19. PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

    Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...

    Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel in Cluster Computing
    Article 06 April 2024
  20. A key agreement protocol based on spiking neural P systems with anti-spikes

    Spiking neural P systems, SN P systems for short, have found various applications over time. Perhaps the most important application to date is in the...

    Mihail-Iulian Plesa, Marian Gheoghe, ... Gexiang Zhang in Journal of Membrane Computing
    Article 22 December 2022
Did you find what you were looking for? Share feedback.