Results 21 to 30 of about 780,853 (256)
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement
Fog architectures are currently present in many applications. Constrained devices equipped with sensors produce measurements that will be sent to a nearby gateway, called the fog. The fog verifies, aggregates and forwards them to the server.
Placide Shabisha +3 more
doaj +1 more source
Key agreement protocol in infinite semigroup representation level
Matrix decomposition problem over integer ring is presented. Solving methods are discussed and it is showed, that this problem is hard computational problem regard to computer memory resources.
Artūras Katvickis +2 more
doaj +1 more source
Communication-Efficient Group Key Agreement [PDF]
Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic operations, and minimizing the communication overhead and the number of protocol rounds is of secondary concern. The dramatic increased in computation power that we witnessed during the past years exposed network delay in WANs as the
Yongdae Kim, Adrian Perrig, Gene Tsudik
openaire +1 more source
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security.
Zhihao Wang, Ru Huo, Shuo Wang
doaj +1 more source
Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch ...
Haibo ZHANG +5 more
doaj +2 more sources
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication
Group key agreement is a good way to ensure secure communication within a group. However, the identity authentication, privacy protection, and information sharing access control (different access rights may exist for different sensitivity of information)
Zhang Qikun +5 more
doaj +1 more source
4G mobile communication is a global technology. Therefore, it is essential to enforce confidentiality between mobile users and their networks. This paper presents a Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie ...
Karim H. Moussa +3 more
doaj +1 more source
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications
Machine to machine (M2M) communications, also called machine-type communications (MTC), has widely been utilized in applications such as telemetry, industrial, automation, and SCADA systems.
Rong Jiang +4 more
doaj +1 more source
An efficient group key agreement scheme for UAV swarms
Unmanned Aerial Vehicle (UAV) group communication plays a crucial role in collaborative UAV operations, yet its security faces numerous challenges. Authentication and key agreement protocols, as core technologies for securing UAV communications, have ...
Zhe Wang +3 more
doaj +1 more source
A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks
Wireless sensor networks are a modern and advanced technology whose applications are fast developing in recent years. Despite being a fascinating topic with various visions of a more intelligent world, there still exist security issues to be resolved in ...
Yue Li +4 more
doaj +1 more source

