Articles with "authentication scheme" as a keyword



Photo from wikipedia

A secure key authentication scheme for cryptosystems based on GDLP and IFP

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-016-2440-3

Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not… read more here.

Keywords: key authentication; authentication scheme; authentication; public key ... See more keywords
Photo by lensingmyworld from unsplash

RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks

Sign Up to like & get
recommendations!
Published in 2021 at "Personal and Ubiquitous Computing"

DOI: 10.1007/s00779-021-01592-7

Abstract: Wireless sensor networks (WSNs) are applicable in numerous fields ranging from very common to those demanding critical security concerns. It is recommended to provide external users a direct access to the data from sensors as… read more here.

Keywords: wireless sensor; scheme; authentication; security ... See more keywords
Photo by scottwebb from unsplash

A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4302-4

Abstract: In real-life applications, ensuring secure transmission of data over public network channels to prevent malicious eavesdropping of the data is an important issue. Several potential security risks arise while protecting data and providing access control… read more here.

Keywords: authentication scheme; authentication; security; scheme ... See more keywords
Photo from wikipedia

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0460-1

Abstract: The session initiation protocol (SIP) is a signaling protocol which is used to controlling communication in the Internet. It is also used for initiating, terminating and maintaining the sessions. A strong authentication scheme plays a… read more here.

Keywords: authentication scheme; session initiation; authentication; scheme ... See more keywords
Photo by lensingmyworld from unsplash

ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-02349-5

Abstract: In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372 ) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a user and a smart… read more here.

Keywords: ilas iot; improved lightweight; scheme; lightweight authentication ... See more keywords
Photo from wikipedia

A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception

Sign Up to like & get
recommendations!
Published in 2019 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-019-03752-7

Abstract: Internet of Things (IoT) is known as a hot topic in current decade. As a widely accepted IoT technology, wireless sensor network (WSN) is employed in fire alarming, agriculture, etc. However, how to devise a… read more here.

Keywords: multi gateway; authentication; authentication scheme; sensor ... See more keywords
Photo by camstejim from unsplash

End to end light weight mutual authentication scheme in IoT-based healthcare environment

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Reliable Intelligent Environments"

DOI: 10.1007/s40860-019-00079-w

Abstract: In a modern healthcare environment, the adoption of mobile health care technology is promising to enhance the quality of patient monitoring of chronically ill as well as elderly and healthy individuals for quick intervention at… read more here.

Keywords: authentication scheme; healthcare environment; scheme; environment ... See more keywords
Photo from wikipedia

Privacy Protection Smartcard Authentication Scheme in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2018 at "Chinese Journal of Electronics"

DOI: 10.1049/cje.2017.10.002

Abstract: Cloud computing provides users with a great deal of flexibility and convenience. However, cloud computing also brings very serious security problems, especially for enterprise data security stored in the cloud. Once the data is outsourced… read more here.

Keywords: cloud; privacy; cloud computing; authentication scheme ... See more keywords
Photo by strong18philip from unsplash

A lightweight authentication scheme for telecare medical information system

Sign Up to like & get
recommendations!
Published in 2021 at "Connection Science"

DOI: 10.1080/09540091.2021.1889976

Abstract: ABSTRACT The rapid development of information technology promotes the development and application of Telecare Information System (TMIS). However, TMIS also has security problems such as information leakage, false authentication, and key loss. In order to… read more here.

Keywords: telecare; authentication; information system; authentication scheme ... See more keywords
Photo by camstejim from unsplash

Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2841972

Abstract: Many smart healthcare applications are adopting cloud to provide services to patients. However, the sensitive data can be disclosed to the authentication server/service provider. Therefore, security and privacy are crucial to its success and deployment… read more here.

Keywords: healthcare applications; authentication scheme; authentication; anonymous authentication ... See more keywords
Photo by strong18philip from unsplash

A Robust Authentication Scheme With Continuously Updated Information for Vehicular Sensor Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2880984

Abstract: Traffic accidents frequently occur due to the mistakes of drivers, and many people are injured or lose their lives in this way. However, with the increasing use of Internet of Things in real applications, vehicle… read more here.

Keywords: authentication scheme; updated information; authentication; scheme ... See more keywords