Search
Search Results
-
A dynamic C-V2X anonymous authentication and group key agreement protocol
At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named...
-
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments
The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and...
-
Provable secure authentication key agreement for wireless body area networks
Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...
-
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function
Nowadays, smart card and password-based user authentication and key agreement schemes have become an integral mechanism to ensure only legitimate...
-
Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations
Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuation capabilities, working collaboratively...
-
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the...
-
Multicast Key Agreement, Revisited
Multicast Key Agreement (MKA) is a long-overlooked natural primitive of large practical interest. In traditional MKA, an omniscient group manager... -
Fork-Resilient Continuous Group Key Agreement
Continuous Group Key Agreement (CGKA) lets an evolving group of clients agree on a sequence of group keys. An important application of CGKA is... -
Cryptanalysis of a secure and efficient Diffie–Hellman based key agreement scheme
Recently a group key agreement protocol based on the key tree and Diffie-Hellman for systems of constrained resources was proposed. We show that the...
-
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication
The three party authenticated key agreement protocol assists two parties in affirming one another and agreeing on a shared session key with the...
-
Blockchain-Assisted Authentication and Key Agreement Protocol for Cloud-Edge Collaboration
In response to the urgent need for scalable, lightweight, low-latency, anonymous, and highly secure identity authentication and key agreement... -
Blockchain-Based Group Key Agreement
Blockchain can provide trusted ledgers on distributed architecture without the help of any central authority. Since all the transactions are saved in... -
An efficient hybrid multifactor mutual authentication and session key agreement scheme for patient monitoring system using IoMT
The Internet of Medical Things (IoMT) provides such flexibility in our society where anyone can get medical treatment at any time, from anywhere....
-
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical...
-
A construction of post quantum secure authenticated key agreement design for mobile digital rights management system
The quantum computing being a threat motivates us to design a post quantum secure authentication protocol for mobile digital rights management...
-
An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems
Internet of Things is one of the prevalent and inevitable trends of the current era where data is found to be scattered among sensing devices. This...
-
A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid
With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent...
-
A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN
Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used in the health sector to continuously monitor patients’ health...
-
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...
-
A key agreement protocol based on spiking neural P systems with anti-spikes
Spiking neural P systems, SN P systems for short, have found various applications over time. Perhaps the most important application to date is in the...