Results 1 to 10 of about 44,482 (159)
Anonymous Authentication for Smartcards [PDF]
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smartcard authentication. Currently the smartcards are used for many purposes - e.g.
J. Hajny
doaj +4 more sources
Anonymous-authentication scheme based on fog computing for VANET. [PDF]
Privacy protection in vehicular ad hoc networks (VANETs) has always been a research hotspot, especially the issue of vehicle authentication, which is critical to ensure the safe communication of vehicles.
Mu Han, Shuai Liu, Shidian Ma, Ailan Wan
doaj +2 more sources
In this paper, we study the seemingly paradoxical notion of anonymous authentication: authenticating yourself without revealing your identity. Before studying the technical aspects of anonymous Internet connections and anonymous authentication, we begin
Yehuda Lindell
doaj +3 more sources
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks [PDF]
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness.
Youngseok Chung +4 more
doaj +2 more sources
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services [PDF]
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner ...
Youngsook Lee, Juryon Paik
doaj +2 more sources
Anonymous Authentication Protocol Based on Certificateless Signature for Vehicular Network [PDF]
Vehicle identity is the vehicle’s exclusive user legitimate identification stored in trusted centre,which is directly related to the vehicle user’s information,so that its anonymous authentication reflects the protection of user privacy.Based on a ...
ZHANG Xinyun,XU Yan,CUI Jie
doaj +1 more source
Multi-device anonymous authentication [PDF]
Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples include Pseudonymous Signatures for German personal identity cards and Anonymous Attestation. The main properties are that a user can authenticate himself with a single private key (stored on a smart card), but
Kamil Kluczniak +3 more
openaire +1 more source
The recent advancement in wireless body area networks (WBAN) plays an important role in remote health care systems. However, these networks are suffering from data security and privacy threats.
Subramani Jegadeesan +4 more
doaj +1 more source
Security Analysis and Improvement of Anonymous Authentication Scheme in Vehicle Ad Hoc Network [PDF]
An identity-based anonymous authentication scheme in Vehicle Ad Hoc Network(VANET) is analyzed.It is demonstrated that the attacker can forge authentication proof using the intercepted secret key and public key because of sending the blinded secret key ...
HUO Shiwei,YANG Wenjing,HOU Yintao,SHEN Jinshan
doaj +1 more source
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal +2 more
core +3 more sources

