Results 201 to 210 of about 10,790,774 (280)
Some of the next articles are maybe not open access.

Group Key Exchange Compilers from Generic Key Exchanges

International Conference on Network and System Security, 2021
Hector B. Hougaard, Atsuko Miyaji
openaire   +2 more sources

PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT

IEEE Internet of Things Journal, 2023
Internet of Things (IoT) is evolving as a ubiquitous technology to thrive human lives with minimal time and effort. The resource-constrained IoT devices operating in an ambient environment with minimal or no safeguards are highly susceptible to physical ...
Sourav Roy   +5 more
semanticscholar   +1 more source

An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs

IEEE transactions on intelligent transportation systems (Print), 2022
The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance ...
P. Vijayakumar   +3 more
semanticscholar   +1 more source

A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT

IEEE Transactions on Wireless Communications, 2023
The number of IoT devices is growing rapidly, and the interaction between devices and servers is also more frequent. However, IoT devices are often at the edge of the network, which leads their communications with the server to be completely exposed ...
Daojing He   +5 more
semanticscholar   +1 more source

A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT

IEEE Sensors Journal, 2021
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the ...
Sensen Li   +3 more
semanticscholar   +1 more source

LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices

IEEE Systems Journal, 2021
The recent advancement in quantum computers generates the threat alarm of breaking the security of key exchange protocols, which is based on discrete logarithmic or prime factorization problem in polynomial time.
Vivek Dabra, Anju Bala, S. Kumari
semanticscholar   +1 more source

A secure authenticated and key exchange scheme for fog computing

Enterprise Information Systems, 2020
Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed
Chien‐Ming Chen   +4 more
semanticscholar   +1 more source

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

IEEE Transactions on Dependable and Secure Computing, 2019
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs).
Urbi Chatterjee   +6 more
semanticscholar   +1 more source

An Efficient Implementation of the NewHope Key Exchange on FPGAs

IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2020
Lattice based cryptography plays an important role in the construction of post-quantum cryptography, including key exchange, public key encryption as well as digital signature schemes.
Yufei Xing, Shuguo Li
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy