Articles with "mutual authentication" as a keyword



Photo by scottwebb from unsplash

Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3145959

Abstract: In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety of remote… read more here.

Keywords: mutual authentication; ecc; security; protocol ... See more keywords
Photo by charlesdeluvio from unsplash

Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2021.3114507

Abstract: In this paper, we present a three-byte-based Media Access Control (MAC) protocol to resolve the mutual authentication problem in an Autonomous Internet of Vehicles (AIoV) network. Initially, the network architecture is divided into two chains,… read more here.

Keywords: authentication; network; byte based; mutual authentication ... See more keywords
Photo by markusspiske from unsplash

Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/1550147718795120

Abstract: Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The… read more here.

Keywords: ultralightweight mutual; mutual authentication; protocol; internet things ... See more keywords
Photo by hudsoncrafted from unsplash

Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0271817

Abstract: The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is… read more here.

Keywords: agreement; mutual authentication; authentication key; protocol ... See more keywords