Articles with "key authentication" as a keyword



Photo from wikipedia

A secure key authentication scheme for cryptosystems based on GDLP and IFP

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-016-2440-3

Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not… read more here.

Keywords: key authentication; authentication scheme; authentication; public key ... See more keywords
Photo by hudsoncrafted from unsplash

Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN)

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Networks"

DOI: 10.1007/s11276-016-1197-z

Abstract: Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due… read more here.

Keywords: key authentication; vanet; detection; group key ... See more keywords