Results 21 to 30 of about 12,317,693 (236)

Post-quantum identity-based authenticated multiple key agreement protocol

open access: yesETRI Journal, 2023
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang   +3 more
doaj   +1 more source

Polar Coding for Secure Transmission and Key Agreement [PDF]

open access: yes, 2010
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest.
Gamal, Hesham El, Koyluoglu, O. Ozan
core   +3 more sources

Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare

open access: yesFuture Internet, 2023
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services.
Zeeshan Ashraf   +2 more
doaj   +1 more source

An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP

open access: yesSensors, 2022
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats.
Bin Ma   +7 more
doaj   +1 more source

SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks

open access: yesIEEE Transactions on Information Forensics and Security, 2021
With the rising popularity of the Internet and communication technology, vehicles can analyze and judge the real-time data collected by various cloud service providers (CSPs) in a vehicular network.
Jing Zhang   +4 more
semanticscholar   +1 more source

An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment

open access: yesMathematics, 2021
With the increasing number of users and the emergence of different types of network services, a multi-server architecture has emerged in recent years.
Yicheng Yu   +3 more
doaj   +1 more source

Secure Authentication in the Smart Grid

open access: yesMathematics, 2022
Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications.
Mehdi Hosseinzadeh   +4 more
doaj   +1 more source

Low-power Secret-key Agreement over OFDM [PDF]

open access: yes, 2013
Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date.
Baldi, Marco   +7 more
core   +2 more sources

Reusing Static Keys in Key Agreement Protocols [PDF]

open access: yes, 2009
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in ...
Chatterjee, Sanjit   +2 more
openaire   +2 more sources

A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph

open access: yesFuture Internet, 2023
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks.
Qiang Li
doaj   +1 more source

Home - About - Disclaimer - Privacy