Articles with "ecc based" as a keyword



Photo from wikipedia

A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204271

Abstract: Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has miserable significance in many areas, including wildlife monitoring,… read more here.

Keywords: authentication; authentication scheme; verifiably secure; scheme ... See more keywords
Photo by larskienle from unsplash

On the Security of an ECC-Based Authentication Scheme for Internet of Drones

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2022.3162604

Abstract: We demonstrate that the ECC-based authentication scheme for internet of drones (short for IoD-AS, published in IEEE Systems Journal, Hussain et al., 2021) Amassing the security: An ECC-based authentication scheme for Internet of Drones) fails… read more here.

Keywords: authentication scheme; scheme internet; internet drones; ecc based ... See more keywords