Articles with "authenticated key" as a keyword



Photo by hudsoncrafted from unsplash

A secure mutual authenticated key agreement of user with multiple servers for critical systems

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-5078-y

Abstract: Recent technological advances in almost all critical systems’ domains have led to an explosive growth of multimedia big data. Those advances encompass the ever increasing innovative digital and remote mobile devices being operated on the… read more here.

Keywords: authentication; secure mutual; authenticated key; mutual authenticated ... See more keywords
Photo from wikipedia

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

Sign Up to like & get
recommendations!
Published in 2020 at "Digital Communications and Networks"

DOI: 10.1016/j.dcan.2020.05.001

Abstract: Abstract During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple servers to ensure seamless online services… read more here.

Keywords: hash based; scheme; authenticated key; multi server ... See more keywords
Photo by hudsoncrafted from unsplash

Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215688

Abstract: In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these… read more here.

Keywords: authenticated key; key establishment; based authenticated; trajectory based ... See more keywords
Photo by hudsoncrafted from unsplash

Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3275017

Abstract: The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics of cloud computing cannot meet… read more here.

Keywords: authentication; authenticated key; scheme; fog ... See more keywords
Photo by anniespratt from unsplash

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2923611

Abstract: Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving… read more here.

Keywords: iov; fog; internet vehicles; security ... See more keywords
Photo by aaronburden from unsplash

LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3085595

Abstract: Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely… read more here.

Keywords: key exchange; lightweight user; lake 6sh; 6lowpan based ... See more keywords
Photo by drew_hays from unsplash

Anonymous Dynamic Group Authenticated Key Agreements Using Physical Unclonable Functions for Internet of Medical Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3149117

Abstract: Group authenticated key agreements (GAKAs) for an Internet of Medical Things (IoMT) enable medical sensor devices to authenticate each other and agree upon a common session key. These medical sensor devices can then establish a… read more here.

Keywords: group authenticated; key agreements; medical things; group ... See more keywords
Photo by scottwebb from unsplash

ECC-Based Authenticated Key Agreement Protocol for Industrial Control System

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3219233

Abstract: Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the industrial control systems (ICSs) have been used extensively, which has brought more and more serious information security threats to the ICS… read more here.

Keywords: agreement; security; industrial control; authenticated key ... See more keywords
Photo by dropthelabelmovement from unsplash

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2017.2685524

Abstract: Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining… read more here.

Keywords: leakage resilient; ake; identity based; authenticated key ... See more keywords
Photo from wikipedia

An Efficient One-Way Authenticated Key Exchange Protocol for Anonymity Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2020.2986506

Abstract: Authenticated key exchange (AKE) is a crucial cryptographic primitive used for establishing an authenticated and confidential communication channel between parties, which has been widely used in our daily life when we surf on the Internet.… read more here.

Keywords: one way; key exchange; anonymity; authenticated key ... See more keywords
Photo by hudsoncrafted from unsplash

Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2016.2594789

Abstract: Two-server password-authenticated key exchange allows the client to split a low-entropy password into two pieces and store them in two servers, respectively, and the two servers collaboratively authenticate the client and establish session keys. Even… read more here.

Keywords: server password; authenticated key; two server; password authenticated ... See more keywords