Results 31 to 40 of about 3,708 (115)
WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) are widely used to provide users with convenient services such as health-care, and smart home. To provide convenient services, sensor nodes in WSN environments collect and send the sensing data to the gateway.
Deok Kyu Kwon +4 more
doaj +1 more source
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. An e xample of Kerberos protocol analysis is given. The software tool that automates the analysis of key g eneration protocols is built.
Nadezhda S. Mogilevskaya
doaj
An Improved Two-Way Security Authentication Protocol for RFID System
This paper proposes an improved two-way security authentication protocol to improve the security level of Radio Frequency Identification (RFID) system. In the proposed protocol, tags calculate hash value, which is divided into two parts. The left half is
Baolong Liu, Bing Yang, Xiaohao Su
doaj +1 more source
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. An e xample of Kerberos protocol analysis is given. The software tool that automates the analysis of key g eneration protocols is built.
Nadezhda S. Mogilevskaya
doaj
Robot Identification and Authentication in a Robot Cloud Service System
In recent years, information technology has become a focus of attention. All hardware, software, and communication technologies are growing rapidly. Nowadays, we can't live without technology.
Chin-Ling Chen +3 more
doaj +1 more source
The transition that wasn’t: why Sri Lanka’s organic farming approach failed
In 2021, the government of Sri Lanka sought to stimulate the country’s transition to organic farming by way of an import ban on fertilizers and pesticides.
Sören Köpke
doaj +1 more source
Tripartite authenticated key exchange protocol for smart grid
Most of the existing authentication schemes in the smart grid environment have the drawbacks of requiring manual participation or low performance, and thus do not meet the practical needs of smart grids.A new tripartite authenticated key exchange ...
Shengbao WANG +3 more
doaj +2 more sources
Light-weight Mutual Authentication with Non-repudiation [PDF]
In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events.
V. Clupek, V. Zeman, P. Dzurenda
doaj
Wireless sensor networks (WSN) are composed of multiple sensor nodes with limited storage, computation, power, and communication capabilities and are widely used in various fields such as banks, hospitals, institutes to national defense, research, and so
SungJin Yu, YoungHo Park
doaj +1 more source
Method of designing security protocol for remote attestation
By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to ...
YU Rong-wei1, WANG Li-na1, KUANG Bo1
doaj +2 more sources

