Sign Up to like & get
recommendations!
1
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-5078-y
Abstract: Recent technological advances in almost all critical systems’ domains have led to an explosive growth of multimedia big data. Those advances encompass the ever increasing innovative digital and remote mobile devices being operated on the…
read more here.
Keywords:
authentication;
secure mutual;
authenticated key;
mutual authenticated ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Digital Communications and Networks"
DOI: 10.1016/j.dcan.2020.05.001
Abstract: Abstract During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple servers to ensure seamless online services…
read more here.
Keywords:
hash based;
scheme;
authenticated key;
multi server ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3215688
Abstract: In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these…
read more here.
Keywords:
authenticated key;
key establishment;
based authenticated;
trajectory based ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3275017
Abstract: The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics of cloud computing cannot meet…
read more here.
Keywords:
authentication;
authenticated key;
scheme;
fog ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2923611
Abstract: Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving…
read more here.
Keywords:
iov;
fog;
internet vehicles;
security ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3085595
Abstract: Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely…
read more here.
Keywords:
key exchange;
lightweight user;
lake 6sh;
6lowpan based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3149117
Abstract: Group authenticated key agreements (GAKAs) for an Internet of Medical Things (IoMT) enable medical sensor devices to authenticate each other and agree upon a common session key. These medical sensor devices can then establish a…
read more here.
Keywords:
group authenticated;
key agreements;
medical things;
group ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3219233
Abstract: Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the industrial control systems (ICSs) have been used extensively, which has brought more and more serious information security threats to the ICS…
read more here.
Keywords:
agreement;
security;
industrial control;
authenticated key ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2017.2685524
Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining…
read more here.
Keywords:
leakage resilient;
ake;
identity based;
authenticated key ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2020.2986506
Abstract: Authenticated key exchange (AKE) is a crucial cryptographic primitive used for establishing an authenticated and confidential communication channel between parties, which has been widely used in our daily life when we surf on the Internet.…
read more here.
Keywords:
one way;
key exchange;
anonymity;
authenticated key ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2016.2594789
Abstract: Two-server password-authenticated key exchange allows the client to split a low-entropy password into two pieces and store them in two servers, respectively, and the two servers collaboratively authenticate the client and establish session keys. Even…
read more here.
Keywords:
server password;
authenticated key;
two server;
password authenticated ... See more keywords