Articles with "authentication protocols" as a keyword



Photo by markusspiske from unsplash

Provably privacy analysis and improvements of the lightweight RFID authentication protocols

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Networks"

DOI: 10.1007/s11276-019-02037-z

Abstract: Radio Frequency Identification (RFID) systems authenticate products as well as people without any physical contact. Using RFID systems is an inevitable part of recent identifying and shopping affairs. However, RFID systems have huge hardware limitations… read more here.

Keywords: rfid authentication; authentication; lightweight rfid; weak privacy ... See more keywords
Photo by pawel_czerwinski from unsplash

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Computer Science and Technology"

DOI: 10.1007/s11390-019-1961-5

Abstract: Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise… read more here.

Keywords: authentication; cellular networks; protocols cdma; side channel ... See more keywords
Photo from wikipedia

On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite–Ground Integrated Networks

Sign Up to like & get
recommendations!
Published in 2023 at "Sensors"

DOI: 10.3390/s23115075

Abstract: Satellite–ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues are challenging with heterogeneous networks. Specifically, although 5G authentication and key agreement (AKA) protects terminal… read more here.

Keywords: authentication; ground integrated; roaming authentication; satellite ground ... See more keywords