Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography [PDF]
In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels.
Chen, Jing +3 more
core +1 more source
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services.
S. Jan, Fawad Qayum, Habib Ullah Khan
semanticscholar +1 more source
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal +2 more
core +3 more sources
New security notions and feasibility results for authentication of quantum data [PDF]
We give a new class of security definitions for authentication in the quantum setting. These definitions capture and strengthen existing definitions of security against quantum adversaries for both classical message authentication codes (MACs) and well ...
Garg, Sumegha +2 more
core +2 more sources
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle accidents, and speed.
SungJin Yu +4 more
doaj +1 more source
Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity.
The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is one of the ...
Hyang-Rim Jo +3 more
doaj +1 more source
Universal blind quantum computation [PDF]
We present a protocol which allows a client to have a server carry out a quantum computation for her such that the client's inputs, outputs and computation remain perfectly private, and where she does not require any quantum computational power or memory.
Broadbent, Anne +2 more
core +2 more sources
An Improved Anonymous Authentication Protocol for Location-Based Service
The authentication protocols are implemented to provide identity authentication for communication entities. With the increasing demand of network security and the development of technology, the anonymous authentication protocol for LBS (location based ...
Cao Shouqi +4 more
doaj +1 more source
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.).
A Blanco +15 more
core +2 more sources
ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology [PDF]
Reliable authentication requires the devices and channels involved in the process to be trustworthy; otherwise authentication secrets can easily be compromised.
Gutmann, Andreas +6 more
core +2 more sources

