Results 11 to 20 of about 2,279,222 (327)

Mobile distributed authentication protocol [PDF]

open access: yes, 2003
Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised. Depending on a single entity is undesirable as it has security, trust and availability issues.
Alshahri, A., Smith, D.G., Irvine, J.
openaire   +3 more sources

Authenticated File Broadcast Protocol [PDF]

open access: yes, 2015
The File Broadcast Protocol (FBP) was developed as a part of the DETIboot system. DETIboot allows a host to broadcast an operating system image through an 802.11 wireless network to an arbitrary number of receivers. Receivers can load the image and immediately boot a Linux live session. The initial version of FBP had no security mechanisms.
Reis, Simão   +3 more
openaire   +2 more sources

A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

open access: yesIEEE Access, 2021
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things.
Yuan Lei   +4 more
semanticscholar   +1 more source

Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment

open access: yesIEEE Consumer Electronics Magazine, 2021
Due to the ever-growing use of active Internet devices, the Internet has achieved good popularity at present. The smart devices could connect to the Internet and communicate together that shape the Internet of Things (IoT).
Ali Shahidinejad   +4 more
semanticscholar   +1 more source

Anonymous Authentication Protocol Based on Certificateless Signature for Vehicular Network [PDF]

open access: yesJisuanji gongcheng, 2016
Vehicle identity is the vehicle’s exclusive user legitimate identification stored in trusted centre,which is directly related to the vehicle user’s information,so that its anonymous authentication reflects the protection of user privacy.Based on a ...
ZHANG Xinyun,XU Yan,CUI Jie
doaj   +1 more source

Greater Expectations? [PDF]

open access: yes, 1987
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a ...
A.-R. Sadeghi   +16 more
core   +8 more sources

New enhanced authentication protocol for Internet of Things

open access: yesBig Data Mining and Analytics, 2021
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.
Mourade Azrour   +3 more
semanticscholar   +1 more source

Multiparty simultaneous quantum identity authentication based on entanglement swapping [PDF]

open access: yes, 2006
We present a multiparty simultaneous quantum identity authentication protocol based on entanglement swapping.
Beige A   +14 more
core   +2 more sources

Deniable authentication for multi-party protocol

open access: yes网络与信息安全学报, 2016
Deniable authentication can authenticate messages like digital signatures,and its non-public verification can meet many requirements that cannot be met by signatures,such as privacy preservation.How to achieve deni-able authentication with multi-party ...
Yong CHEN,Long LU,Sheng-ke ZENG,Ming-xing HE
doaj   +3 more sources

Implementation of Event-Based Dynamic Authentication on MQTT Protocol

open access: yesJurnal Rekayasa Elektrika, 2019
This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT.
Rizka Reza Pahlevi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy