Results 1 to 10 of about 44,482 (159)

Anonymous Authentication for Smartcards [PDF]

open access: yesRadioengineering, 2010
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smartcard authentication. Currently the smartcards are used for many purposes - e.g.
J. Hajny
doaj   +4 more sources

Anonymous-authentication scheme based on fog computing for VANET. [PDF]

open access: yesPLoS ONE, 2020
Privacy protection in vehicular ad hoc networks (VANETs) has always been a research hotspot, especially the issue of vehicle authentication, which is critical to ensure the safe communication of vehicles.
Mu Han, Shuai Liu, Shidian Ma, Ailan Wan
doaj   +2 more sources

Anonymous Authentication

open access: yesThe Journal of Privacy and Confidentiality, 2011
In this paper, we study the seemingly paradoxical notion of anonymous authentication: authenticating yourself without revealing your identity. Before studying the technical aspects of anonymous Internet connections and anonymous authentication, we begin
Yehuda Lindell
doaj   +3 more sources

An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks [PDF]

open access: yesSensors, 2016
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness.
Youngseok Chung   +4 more
doaj   +2 more sources

Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services [PDF]

open access: yesThe Scientific World Journal, 2014
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner ...
Youngsook Lee, Juryon Paik
doaj   +2 more sources

Anonymous Authentication Protocol Based on Certificateless Signature for Vehicular Network [PDF]

open access: yesJisuanji gongcheng, 2016
Vehicle identity is the vehicle’s exclusive user legitimate identification stored in trusted centre,which is directly related to the vehicle user’s information,so that its anonymous authentication reflects the protection of user privacy.Based on a ...
ZHANG Xinyun,XU Yan,CUI Jie
doaj   +1 more source

Multi-device anonymous authentication [PDF]

open access: yesInternational Journal of Information Security, 2016
Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples include Pseudonymous Signatures for German personal identity cards and Anonymous Attestation. The main properties are that a user can authenticate himself with a single private key (stored on a smart card), but
Kamil Kluczniak   +3 more
openaire   +1 more source

EPAW: Efficient Privacy Preserving Anonymous Mutual Authentication Scheme for Wireless Body Area Networks (WBANs)

open access: yesIEEE Access, 2020
The recent advancement in wireless body area networks (WBAN) plays an important role in remote health care systems. However, these networks are suffering from data security and privacy threats.
Subramani Jegadeesan   +4 more
doaj   +1 more source

Security Analysis and Improvement of Anonymous Authentication Scheme in Vehicle Ad Hoc Network [PDF]

open access: yesJisuanji gongcheng, 2018
An identity-based anonymous authentication scheme in Vehicle Ad Hoc Network(VANET) is analyzed.It is demonstrated that the attacker can forge authentication proof using the intercepted secret key and public key because of sending the blinded secret key ...
HUO Shiwei,YANG Wenjing,HOU Yintao,SHEN Jinshan
doaj   +1 more source

AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]

open access: yes, 2017
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy