Results 171 to 180 of about 12,317,693 (236)
Some of the next articles are maybe not open access.

A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones

IEEE Internet of Things Journal
The drone technology has continuously been evolving since the beginning of the first decade of the 21st century with exceptional growth over the last several years.
Image Bhattarai   +3 more
semanticscholar   +1 more source

A Beyond-5G Authentication and Key Agreement Protocol

International Conference on Network and System Security, 2022
The standardized Authentication and Key Agreement protocol for 5G networks (5G AKA) have several security and privacy vulnerabilities. In this paper, we propose a novel authentication and key agreement protocol for 5G and beyond that is compatible with ...
M. T. Damir   +3 more
semanticscholar   +1 more source

Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing

IEEE Transactions on Mobile Computing, 2022
Wearable computing has been used in a wide range of applications. But wearable computing often suffers from various security and privacy issues. To solve these issues, many effective authentication schemes have been proposed.
Yimin Guo, Zhenfeng Zhang, Yajun Guo
semanticscholar   +1 more source

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

IEEE Transactions on Vehicular Technology, 2020
Autonomous vehicles (AVs) are increasingly common, although there remain a number of limitations that need to be addressed in order for their deployment to be more widespread.
Qi Jiang   +5 more
semanticscholar   +1 more source

Certificateless two-party authenticated key agreement scheme for smart grid

Information Sciences, 2021
Smart grid is a fully automated power transmission network. It monitors and controls each user and grid node to ensure bidirectional flow of information and power between all nodes.
Lunzhi Deng, Ronghai Gao
semanticscholar   +1 more source

Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things

IEEE Transactions on Dependable and Secure Computing, 2020
With an exponential increase in the popularity of Internet, the real-time data collected by various smart sensing devices can be analyzed remotely by a remote user (e.g., a manager) in the Industrial Internet of Things (IIoT).
Jangirala Srinivas   +3 more
semanticscholar   +1 more source

Key Agreement Protocols

2003
Key agreement, as the name implies, is a process in which principals cooperate in order to establish a session key. Amongst the class of public key protocols for key establishment without a server, key agreement has become much more popular than key transport in recent years.
Colin Boyd, Anish Mathuria
openaire   +1 more source

A lightweight authentication and key agreement scheme for Internet of Drones

Computer Communications, 2020
Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport the commodity with the help of embedded various sensors. They have been widely used in various fields and brought a great convenience to the production and life.
Yunru Zhang   +3 more
semanticscholar   +1 more source

On key agreement and conference key agreement

1997
An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is sufficient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference key agreement protocols.
openaire   +1 more source

Lightweight key agreement with key chaining

The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), 2010
Small ad-hoc wireless networks are becoming ubiquitous. Wireless protocols like ZigBee, ANT, and Bluetooth have been targeted towards small devices with limited capabilities. As the volume and sensitivity of data being communicated over these networks increases so does the need for security. The limited capabilities of these devices, however, means the
Paul Krier   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy