Results 11 to 20 of about 2,279,222 (327)
Mobile distributed authentication protocol [PDF]
Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised. Depending on a single entity is undesirable as it has security, trust and availability issues.
Alshahri, A., Smith, D.G., Irvine, J.
openaire +3 more sources
Authenticated File Broadcast Protocol [PDF]
The File Broadcast Protocol (FBP) was developed as a part of the DETIboot system. DETIboot allows a host to broadcast an operating system image through an 802.11 wireless network to an arbitrary number of receivers. Receivers can load the image and immediately boot a Linux live session. The initial version of FBP had no security mechanisms.
Reis, Simão +3 more
openaire +2 more sources
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things.
Yuan Lei +4 more
semanticscholar +1 more source
Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
Due to the ever-growing use of active Internet devices, the Internet has achieved good popularity at present. The smart devices could connect to the Internet and communicate together that shape the Internet of Things (IoT).
Ali Shahidinejad +4 more
semanticscholar +1 more source
Anonymous Authentication Protocol Based on Certificateless Signature for Vehicular Network [PDF]
Vehicle identity is the vehicle’s exclusive user legitimate identification stored in trusted centre,which is directly related to the vehicle user’s information,so that its anonymous authentication reflects the protection of user privacy.Based on a ...
ZHANG Xinyun,XU Yan,CUI Jie
doaj +1 more source
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a ...
A.-R. Sadeghi +16 more
core +8 more sources
New enhanced authentication protocol for Internet of Things
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.
Mourade Azrour +3 more
semanticscholar +1 more source
Multiparty simultaneous quantum identity authentication based on entanglement swapping [PDF]
We present a multiparty simultaneous quantum identity authentication protocol based on entanglement swapping.
Beige A +14 more
core +2 more sources
Deniable authentication for multi-party protocol
Deniable authentication can authenticate messages like digital signatures,and its non-public verification can meet many requirements that cannot be met by signatures,such as privacy preservation.How to achieve deni-able authentication with multi-party ...
Yong CHEN,Long LU,Sheng-ke ZENG,Ming-xing HE
doaj +3 more sources
Implementation of Event-Based Dynamic Authentication on MQTT Protocol
This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT.
Rizka Reza Pahlevi +2 more
doaj +1 more source

