Results 1 to 10 of about 561,825 (309)

On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices [PDF]

open access: yesSensors, 2023
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices.
Da-Zhi Sun, Yi-Na Gao, Yangguang Tian
doaj   +2 more sources

LPWAN Key Exchange: A Centralised Lightweight Approach [PDF]

open access: yesSensors, 2022
The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users.
Gaurav Pathak   +3 more
doaj   +2 more sources

Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments [PDF]

open access: yesSensors, 2018
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing ...
Dae-Hwi Lee, Im-Yeong Lee
doaj   +2 more sources

Algorithms for Lightweight Key Exchange. [PDF]

open access: yesSensors (Basel), 2017
Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile ...
Alvarez R   +3 more
europepmc   +5 more sources

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

open access: goldIEEE Access, 2018
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park   +3 more
doaj   +2 more sources

Predicate-Based Key Exchange. [PDF]

open access: green, 2010
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy ...
James Birkett, Douglas Stebila
openalex   +3 more sources

Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0 [PDF]

open access: goldIEEE Access, 2020
Industry 4.0 has brought solutions for faster data accessibility, fault identification, performance analysis, and control of machines remotely by managers.
Gurjot Singh Gaba   +5 more
doaj   +2 more sources

New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]

open access: yesJisuanji kexue, 2022
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj   +1 more source

Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems [PDF]

open access: yesNīvār, 2023
Considering that in automatic weather station systems, raw data is collected by sensors by AWSs, and these sensors themselves cannot process raw data.
Yashar Salami   +2 more
doaj   +1 more source

Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-Based Smart Home

open access: yesIEEE Access, 2023
The IPv4 address architecture has been declared ended finally due to the fast growth of the Internet of Things (IoT). IPv6 is becoming a next-generation communication protocol and provides all the requirements that the industry needs.
Zeeshan Ashraf   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy