Articles with "authentication key" as a keyword



Photo from wikipedia

Authentication of key aroma compounds in apple using stable isotope approach.

Sign Up to like & get
recommendations!
Published in 2019 at "Food chemistry"

DOI: 10.1016/j.foodchem.2018.10.140

Abstract: Gas chromatography-combustion-isotope ratio mass spectrometry (GC-C-IRMS) for the analysis of key volatile compounds sampled using headspace solid phase microextraction (HS-SPME) is an appropriate tool for authenticity assessment of apple aromas. The current research characterises 18… read more here.

Keywords: compounds apple; isotope; authentication key; aroma compounds ... See more keywords
Photo from wikipedia

Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems

Sign Up to like & get
recommendations!
Published in 2020 at "Sustainable Cities and Society"

DOI: 10.1016/j.scs.2020.102416

Abstract: Abstract Internet of Things (IoT) utilizes an intelligent technique to facilitate the design and development of smart-urban projects. As the smart devices have limited battery sources, IoT services should initiate its setup with low-power consumption.… read more here.

Keywords: iot; smart iot; authentication key; mobile sink ... See more keywords
Photo by scottwebb from unsplash

A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles

Sign Up to like & get
recommendations!
Published in 2022 at "Connection Science"

DOI: 10.1080/09540091.2022.2032602

Abstract: The Internet of Vehicles is deployed in an open environment, and protecting its security and data privacy is the challenge. Carrying out the Internet of Vehicles secure authentication before interaction of information is an important… read more here.

Keywords: authentication; authentication key; security; scheme ... See more keywords
Photo by hudsoncrafted from unsplash

PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3142084

Abstract: Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key… read more here.

Keywords: smart grids; authentication key; puf based; key agreement ... See more keywords
Photo by scottwebb from unsplash

Security Analysis of “SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks”

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3198858

Abstract: In the above article, Zhang et al. (2021) proposed a many-to-many authentication and key agreement scheme named SMAKA for secure authentication and key agreement between multiple vehicles and cloud service providers (CSPs) in a vehicular… read more here.

Keywords: authentication; authentication key; security; scheme ... See more keywords
Photo by hudsoncrafted from unsplash

A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2018.2817028

Abstract: Growing popularity of multimedia applications, pervasive connectivity, higher bandwidth, and euphoric technology penetration among bulk of the human race that happens to be cellular technology users, has fueled the adaptation to long-term evolution (LTE)/system architecture… read more here.

Keywords: authentication key; console grid; key agreement; authentication ... See more keywords
Photo by ldxcreative from unsplash

Provably Secure ECC-Based Authentication and Key Agreement Scheme for Advanced Metering Infrastructure in the Smart Grid

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3191319

Abstract: Advanced metering infrastructure (AMI) is a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication and key agreement (AKA) protocol is needed for AMI systems to ensure the… read more here.

Keywords: metering infrastructure; authentication key; smart grid; advanced metering ... See more keywords
Photo by hudsoncrafted from unsplash

An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2021.3099488

Abstract: The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance driving experience… read more here.

Keywords: authentication; key exchange; enabled vanets; authentication key ... See more keywords
Photo by joakimnadell from unsplash

An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/1550147718754793

Abstract: As an industrial communication data interaction specification, OPC Unified Architecture effectively solves the industrial Internet of Things system integration problem. This article designs an authentication and key agreement scheme based on implicit certificate using the… read more here.

Keywords: authentication key; industrial internet; unified architecture; internet things ... See more keywords
Photo from wikipedia

Secret sharing-based authentication and key agreement protocol for machine-type communications

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/1550147719841003

Abstract: One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered… read more here.

Keywords: based authentication; type communications; authentication key; authentication ... See more keywords
Photo by hudsoncrafted from unsplash

Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0271817

Abstract: The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is… read more here.

Keywords: agreement; mutual authentication; authentication key; protocol ... See more keywords