Articles with "exchange protocol" as a keyword



Photo by hudsoncrafted from unsplash

Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2018.2806974

Abstract: In smart grid, key exchange protocols play a vital role in providing secure channels to read consumption reports from the smart meters. Thus far, several key exchange schemes have been proposed for the networked smart… read more here.

Keywords: isolated smart; key exchange; smart meters; exchange protocol ... See more keywords
Photo by radowanrehan from unsplash

Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2021.3102156

Abstract: In this paper, we introduce a robust authentication protocol for Vehicle-to-Grid (V2G) communication through lightweight and secure cryptographic primitives. In addition, we utilize signcrypt and unsigncrypt functions which facilitate the consumers to have secure access… read more here.

Keywords: signcryption based; based authenticated; exchange protocol; protocol ... See more keywords
Photo from wikipedia

Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0273664

Abstract: Three-party authentication key exchange is a protocol that allows two users to set up a session key for encrypted communication by the help of a trusted remote server. Providing user anonymity and mutual authentication in… read more here.

Keywords: authentication; key exchange; exchange protocol; authentication key ... See more keywords
Photo from wikipedia

A Two-Party Password-Authenticated Key Exchange Protocol with Verifier

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Computational Chemistry"

DOI: 10.4236/jcc.2021.94007

Abstract: To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in… read more here.

Keywords: key exchange; password; password authenticated; authenticated key ... See more keywords