Results 171 to 180 of about 12,317,693 (236)
Some of the next articles are maybe not open access.
IEEE Internet of Things Journal
The drone technology has continuously been evolving since the beginning of the first decade of the 21st century with exceptional growth over the last several years.
Image Bhattarai +3 more
semanticscholar +1 more source
The drone technology has continuously been evolving since the beginning of the first decade of the 21st century with exceptional growth over the last several years.
Image Bhattarai +3 more
semanticscholar +1 more source
A Beyond-5G Authentication and Key Agreement Protocol
International Conference on Network and System Security, 2022The standardized Authentication and Key Agreement protocol for 5G networks (5G AKA) have several security and privacy vulnerabilities. In this paper, we propose a novel authentication and key agreement protocol for 5G and beyond that is compatible with ...
M. T. Damir +3 more
semanticscholar +1 more source
Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing
IEEE Transactions on Mobile Computing, 2022Wearable computing has been used in a wide range of applications. But wearable computing often suffers from various security and privacy issues. To solve these issues, many effective authentication schemes have been proposed.
Yimin Guo, Zhenfeng Zhang, Yajun Guo
semanticscholar +1 more source
IEEE Transactions on Vehicular Technology, 2020
Autonomous vehicles (AVs) are increasingly common, although there remain a number of limitations that need to be addressed in order for their deployment to be more widespread.
Qi Jiang +5 more
semanticscholar +1 more source
Autonomous vehicles (AVs) are increasingly common, although there remain a number of limitations that need to be addressed in order for their deployment to be more widespread.
Qi Jiang +5 more
semanticscholar +1 more source
Certificateless two-party authenticated key agreement scheme for smart grid
Information Sciences, 2021Smart grid is a fully automated power transmission network. It monitors and controls each user and grid node to ensure bidirectional flow of information and power between all nodes.
Lunzhi Deng, Ronghai Gao
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2020
With an exponential increase in the popularity of Internet, the real-time data collected by various smart sensing devices can be analyzed remotely by a remote user (e.g., a manager) in the Industrial Internet of Things (IIoT).
Jangirala Srinivas +3 more
semanticscholar +1 more source
With an exponential increase in the popularity of Internet, the real-time data collected by various smart sensing devices can be analyzed remotely by a remote user (e.g., a manager) in the Industrial Internet of Things (IIoT).
Jangirala Srinivas +3 more
semanticscholar +1 more source
2003
Key agreement, as the name implies, is a process in which principals cooperate in order to establish a session key. Amongst the class of public key protocols for key establishment without a server, key agreement has become much more popular than key transport in recent years.
Colin Boyd, Anish Mathuria
openaire +1 more source
Key agreement, as the name implies, is a process in which principals cooperate in order to establish a session key. Amongst the class of public key protocols for key establishment without a server, key agreement has become much more popular than key transport in recent years.
Colin Boyd, Anish Mathuria
openaire +1 more source
A lightweight authentication and key agreement scheme for Internet of Drones
Computer Communications, 2020Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport the commodity with the help of embedded various sensors. They have been widely used in various fields and brought a great convenience to the production and life.
Yunru Zhang +3 more
semanticscholar +1 more source
On key agreement and conference key agreement
1997An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is sufficient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference key agreement protocols.
openaire +1 more source
Lightweight key agreement with key chaining
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), 2010Small ad-hoc wireless networks are becoming ubiquitous. Wireless protocols like ZigBee, ANT, and Bluetooth have been targeted towards small devices with limited capabilities. As the volume and sensitivity of data being communicated over these networks increases so does the need for security. The limited capabilities of these devices, however, means the
Paul Krier +4 more
openaire +1 more source

