Results 201 to 210 of about 10,790,774 (280)
Some of the next articles are maybe not open access.
Group Key Exchange Compilers from Generic Key Exchanges
International Conference on Network and System Security, 2021Hector B. Hougaard, Atsuko Miyaji
openaire +2 more sources
PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
IEEE Internet of Things Journal, 2023Internet of Things (IoT) is evolving as a ubiquitous technology to thrive human lives with minimal time and effort. The resource-constrained IoT devices operating in an ambient environment with minimal or no safeguards are highly susceptible to physical ...
Sourav Roy +5 more
semanticscholar +1 more source
An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs
IEEE transactions on intelligent transportation systems (Print), 2022The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance ...
P. Vijayakumar +3 more
semanticscholar +1 more source
A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT
IEEE Transactions on Wireless Communications, 2023The number of IoT devices is growing rapidly, and the interaction between devices and servers is also more frequent. However, IoT devices are often at the edge of the network, which leads their communications with the server to be completely exposed ...
Daojing He +5 more
semanticscholar +1 more source
IEEE Sensors Journal, 2021
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the ...
Sensen Li +3 more
semanticscholar +1 more source
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the ...
Sensen Li +3 more
semanticscholar +1 more source
LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices
IEEE Systems Journal, 2021The recent advancement in quantum computers generates the threat alarm of breaking the security of key exchange protocols, which is based on discrete logarithmic or prime factorization problem in polynomial time.
Vivek Dabra, Anju Bala, S. Kumari
semanticscholar +1 more source
A secure authenticated and key exchange scheme for fog computing
Enterprise Information Systems, 2020Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed
Chien‐Ming Chen +4 more
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2019
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs).
Urbi Chatterjee +6 more
semanticscholar +1 more source
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs).
Urbi Chatterjee +6 more
semanticscholar +1 more source
An Efficient Implementation of the NewHope Key Exchange on FPGAs
IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2020Lattice based cryptography plays an important role in the construction of post-quantum cryptography, including key exchange, public key encryption as well as digital signature schemes.
Yufei Xing, Shuguo Li
semanticscholar +1 more source

