Articles with "based authenticated" as a keyword



Photo by hudsoncrafted from unsplash

Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215688

Abstract: In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these… read more here.

Keywords: authenticated key; key establishment; based authenticated; trajectory based ... See more keywords
Photo by radowanrehan from unsplash

Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2021.3102156

Abstract: In this paper, we introduce a robust authentication protocol for Vehicle-to-Grid (V2G) communication through lightweight and secure cryptographic primitives. In addition, we utilize signcrypt and unsigncrypt functions which facilitate the consumers to have secure access… read more here.

Keywords: signcryption based; based authenticated; exchange protocol; protocol ... See more keywords