Articles with "authentication protocol" as a keyword



Photo by lukaszlada from unsplash

A novel dual authentication protocol (DAP) for multi-owners in cloud computing

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0774-y

Abstract: Cloud computing has reached the peak of Gartner hype cycle, and now the focus of every industry is the ability to scale with minimal investment. Scalability comes with its own challenges of data privacy and… read more here.

Keywords: multi; authentication protocol; cloud computing; authentication ... See more keywords
Photo by dtopkin1 from unsplash

Privacy preserving light weight authentication protocol (LEAP) for WBAN by exploring Genus-2 HEC

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7149-8

Abstract: Wireless Body Area Network (WBAN) is evolving as the successful way of monitoring patient health and offers enhanced healthcare solutions to provide the better quality of life for the urban community. As it involves wireless… read more here.

Keywords: privacy preserving; authentication protocol; wban; authentication ... See more keywords
Photo from wikipedia

An authentication protocol based on chaos and zero knowledge proof

Sign Up to like & get
recommendations!
Published in 2020 at "Nonlinear Dynamics"

DOI: 10.1007/s11071-020-05463-3

Abstract: Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port… read more here.

Keywords: based chaos; authentication protocol; port knocking; protocol based ... See more keywords
Photo by alejoreinoso from unsplash

Enhancing EAP-TLS authentication protocol for IEEE 802.11i

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Networks"

DOI: 10.1007/s11276-016-1210-6

Abstract: IEEE 802.11i authentication framework is composed of the 802.1x and an extensible authentication protocol (EAP) mechanism. One of the most applicable techniques in the EAP methods is EAP-transport layer security (EAP-TLS). The EAP-TLS implementation issues… read more here.

Keywords: ieee 802; eap tls; authentication protocol; authentication ... See more keywords
Photo from wikipedia

A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07492-y

Abstract: A fast handover authentication protocol takes an important role for delay-sensitive applications in wireless networks. Mobile users may be granted different priorities depending on communication fees they paid. In this paper, we present a priority-aware… read more here.

Keywords: authentication protocol; authentication; priority aware; protocol ... See more keywords
Photo from wikipedia

Cryptanalysis of Near Field Communication Based Authentication Protocol for Mobile Payment System

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-08667-x

Abstract: Near field communication (NFC) is one of the utmost pullulating technology in the lea of pervasive computing. In the domain of mobile commerce, mobile payments have advantages akin user convenience (anytime and anywhere) enhanced throughout.… read more here.

Keywords: attack; communication; authentication protocol; payment ... See more keywords
Photo by drew_hays from unsplash

An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-018-1015-9

Abstract: With the rapid growth of wireless medical sensor networks (WMSNs) based healthcare applications, protecting both the privacy and security from illegitimate users, are major concern issues since patient’s precise information is vital for the proper… read more here.

Keywords: wireless medical; authentication protocol; authentication; medical sensor ... See more keywords
Photo by bugsster from unsplash

Efficient user authentication protocol for distributed multimedia mobile cloud environment

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-019-01467-z

Abstract: The rapid growth of smart-phone users, mobile services and mobile applications, poses the challenges of storage space, processing capability, and battery lifetime at the users smart phones. Mobile cloud computing helps to overcome these challenges.… read more here.

Keywords: authentication protocol; user authentication; protocol; mobile user ... See more keywords
Photo by matcfelipe from unsplash

A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments

Sign Up to like & get
recommendations!
Published in 2019 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-019-04246-2

Abstract: Mobile user authentication is very crucial to ensure the authenticity and privacy of roaming users in mobility environments. The existing communication technologies are highly vulnerable to security threats and pose a great challenge for the… read more here.

Keywords: authentication protocol; roaming service; authentication; security ... See more keywords
Photo by repponen from unsplash

SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups

Sign Up to like & get
recommendations!
Published in 2019 at "IET Intelligent Transport Systems"

DOI: 10.1049/iet-its.2018.5474

Abstract: Security and mutual reliability are the crucial requirements of an ad hoc network as nodes are dependent upon each other for routing and forwarding their messages. Vehicular ad hoc networks (VANETs) are no exception and… read more here.

Keywords: vanet groups; shareable clouds; authentication protocol; authentication ... See more keywords
Photo by laurenmancke from unsplash

Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2927772

Abstract: For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can… read more here.

Keywords: authentication protocol; wearable devices; protocol ewmdp; protocol ... See more keywords