Filters








3,829 Hits in 5.8 sec

A practical authentication protocol with anonymity for wireless access networks

Yen-Cheng Chen, Shu-Chuan Chuang, Lo-Yao Yeh, Jiun-Long Huang
<span title="2010-02-01">2010</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications.  ...  Recently, Yang et al. proposed a secure and efficient authentication protocol for anonymous channel in wireless systems without employing asymmetric cryptosystems.  ...  It will be shown that HA can successfully authenticate each MS without the use of any verification table.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/wcm.933">doi:10.1002/wcm.933</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ymbc7lnasvbkdoskd5fqwal6du">fatcat:ymbc7lnasvbkdoskd5fqwal6du</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813205759/https://ir.nctu.edu.tw/bitstream/11536/15074/1/000298485700005.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c7/ad/c7adf9c9fd163d7fe3137cf6573294dc0f1eecaa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/wcm.933"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> wiley.com </button> </a>

Evolution of Various Authentication Schemes in Wireless Network over a Decade

Pratik Singh, Bhawna Mallick
<span title="2015-08-18">2015</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
There is a wide range of authentication schemes that varies according to time period. This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade.  ...  Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used.  ...  Jianming Zhu and JianfengMa [1] , proposed a authentication Scheme with Anonymity for Wireless Environments based on hash based authentication scheme for mobile users.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2015905516">doi:10.5120/ijca2015905516</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zay3sbwkgvebxk3aol6phbuaea">fatcat:zay3sbwkgvebxk3aol6phbuaea</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602144519/https://www.ijcaonline.org/research/volume124/number7/singh-2015-ijca-905516.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/bd/66bdfc85d9407e3e0547a22ccf93a1c1a17bceaf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2015905516"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs

Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang
<span title="">2013</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nxzqpsogkbe55mjq33syzghf2e" style="color: black;">The Scientific World Journal</a> </i> &nbsp;
In this paper, we present an anonymous remote user authentication with key agreement scheme for multi-server architecture employing self-certified public keys without pairings.  ...  The proposed scheme can not only retain previous schemes' advantages but also achieve user privacy concern.  ...  The Proposed Scheme In this section, we propose an anonymous remote user authentication scheme for multiserver environment without pairings, which consists of five phases: server registration phase, user  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/419592">doi:10.1155/2013/419592</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/23844397">pmid:23844397</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC3691932/">pmcid:PMC3691932</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cdjdatflrbfdxjpnkcwumzjcii">fatcat:cdjdatflrbfdxjpnkcwumzjcii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200210035821/http://europepmc.org/backend/ptpmcrender.fcgi?accid=PMC3691932&amp;blobtype=pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/21/6d213d68f74eada21d6d4a348e323374cfa09df9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/419592"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3691932" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps

Wen Chung Kuo, Chi-Sheng Lin, Chen-Tsun Chuang, Ming-Chih Kao
<span title="2016-06-27">2016</span> <i title="Publishing House Technologija"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7og4indwyvastaeh3sjmrjhj34" style="color: black;">Information Technology and Control</a> </i> &nbsp;
In 2004, Zhu and Ma proposed an authentication scheme for wireless environments. Afterwards other researchers proposed improvements according to Zhu-Ma scheme.  ...  Wireless network authentication schemes have been researched for about a decade, and associated security problems explored by many researchers.  ...  [3] proposed a strong user authentication scheme (HMZCB-scheme) using smart card for wireless environments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5755/j01.itc.45.2.8875">doi:10.5755/j01.itc.45.2.8875</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7ztnsw7gtnbgdgjcn26inveqva">fatcat:7ztnsw7gtnbgdgjcn26inveqva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160819015516/http://itc.ktu.lt:80/index.php/ITC/article/download/8875/7789" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3d/00/3d0058b5036d502d04db56468786d04c5a36d887.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5755/j01.itc.45.2.8875"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment

Shadi Nashwan
<span title="">2020</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cgiefxp37fcq5cx5seuh7jyomq" style="color: black;">Egyptian Informatics Journal</a> </i> &nbsp;
This paper proposes anonymous access authentication scheme for wireless sensor networks in big data environments (AAA-WSN) to achieve appealing security services.  ...  Comparing with the recent WSNs authentication schemes, the AAA-WSN scheme cannot only achieve strong security services such as user anonymity and mutual authentication, but also performs the perfect forward  ...  This paper proposes anonymous access authentication scheme for wireless sensor networks (AAA-WSN scheme) to provide a set of attractive security services for the big data environments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.eij.2020.02.005">doi:10.1016/j.eij.2020.02.005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bw7i5h4lqvenvn4i6plcjoq6w4">fatcat:bw7i5h4lqvenvn4i6plcjoq6w4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200315100845/https://pdf.sciencedirectassets.com/280281/AIP/1-s2.0-S1110866520301092/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEIn%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIC2p75hiLrwBl2lqfQQxOvIPcw5Rwc4y6NZr%2BDo9YM92AiEA4GONkLLLrLF8x5nQVgbqXKm%2BysvKOterYYRVMDcEROUqtAMIcRACGgwwNTkwMDM1NDY4NjUiDG3qMhlB7JEvhTOnQyqRA1mIqfIGlUPLgGMmLATR3yEb3PtdyaIVER%2F%2F41R6p7LG4kAoWyebno6bWzbagbTpT6Y23PycmefmX4D0yBS0ufnw50iyqTAo%2FU5c0izDPXy1RUsnXCXCVEY3OFUTqisZcQLzKt%2FcC6ELxJpEWXFJffEpcBGSECRAiqzbyOHuRT5x8XT%2Bzja3617jET9yhOkioHT6joPFbAd%2FMq6dhLJJ8TOGBygbYwcGPCqaV5wxZkNlq313KDYM%2B%2BAv3NsuDm2LAzZ5F6mxvXuVDQQX%2BZ%2BgL1qaSEnllchpH0zxuP8c8V7dIAwAiEGcGSXduFiLDaP22FXcAccfySetw3Epc8mPPtSxce1FL8jFgmU%2F4owRmMW%2FI9PxPRskhPRs3X27Xno9Bfb%2B7E%2B9%2BsAwdqSUnOQ1GmBs5437cT0yCSINP3y3vvPPejzNH5AytrG61QuvCU8Y7LaFuYNU7VhiavtUVng%2BHPNzGlfmm4vqQuuNIMLgFKFXXkHlIBBM4sjX00v7lWyWLnZjnAC1jb8FYznC91XtnoahMPzKt%2FMFOusBkxCOL%2B3XjVvbYwRYFh%2Bfg3YAXcsJUznACsRlIRllDs9QyLtlQV37zl33YMKCR5iifzmDJI513xHYzZp05USxRZtTp1w2sfvSRZZIPikisy7JACBlPtg73kQihYp6NGMx6kKPViOih%2FVaw1x60Q8w86%2Frx%2FGIq7WTdwrmDmY%2FB49H5pd2mSr7PxCvG%2FMX1q91DhmIJL1NkEhW%2BE7Xo1BSNU6raKdANGOju2J13UzIOMDVpYsCcn1q0eYW7QKXfn%2B%2FKgMArMQMnRSfV%2F9XxEWpW%2BTFGCk96YjPG7k8s9UUnH%2Bp5ponSktS50MAYw%3D%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Date=20200315T100841Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=300&amp;X-Amz-Credential=ASIAQ3PHCVTYSUWW3QRH%2F20200315%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Signature=2e6f047ab26dc0279f6ff3b4b434b688e24b58beea03e2ff88f5cad9689aedeb&amp;hash=fe403bf9b5790cd242b26af5d0603f44b643c23eb0458118547cbda6144bfee3&amp;host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&amp;pii=S1110866520301092&amp;tid=spdf-218352ee-5243-4b99-917e-af41e01d6862&amp;sid=69912d3b6af4b64dbe7bc452d459ca506b2fgxrqa&amp;type=client" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.eij.2020.02.005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Anonymous IEEE802.1X Authentication System Using Group Signatures

Amang Sudarsono, Toru Nakanishi, Yasuyuki Nogami, Nobuo Funabiki
<span title="">2010</span> <i title="Information Processing Society of Japan"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dpojic4iejf5ni3no6ddhgbqaq" style="color: black;">Journal of Information Processing</a> </i> &nbsp;
In this paper, we present an anonymous IEEE802.1X authentication system using a group signature scheme to allow user authentication without revealing their identities.  ...  The IEEE802.1X protocol is usually used for user authentications to allow only authorized users to access services.  ...  Acknowledgments This work was partially supported by "R&D for advancement of functionality and usability in information history management" from the Ministry of Internal Affairs and Communications, Japan  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2197/ipsjjip.18.63">doi:10.2197/ipsjjip.18.63</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a6u4zq7p6nchdgl7t6k7v5wv2m">fatcat:a6u4zq7p6nchdgl7t6k7v5wv2m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504115452/https://www.jstage.jst.go.jp/article/ipsjjip/18/0/18_0_63/_pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/ef/62ef234be218c64d699afe2a1a4fcfdc2952102b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2197/ipsjjip.18.63"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme without Verification Table in Medical Internet of Things

Kisung Park, Sungkee Noh, Hyunjin Lee, Ashok Kumar Das, Myeonghyun Kim, Youngho Park, Mohammad Wazid
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
leaking verification table attacks, and it does not also ensure anonymity, untraceability and secure mutual authentication.  ...  This paper proposes a provably secure and lightweight MAKA scheme for medical IoT, called LAKS Non-verification table (NVT), that does not require a server verification table.  ...  ACKNOWLEDGEMENT The authors thank the anonymous reviewers and associate editor for their valuable feedback on the paper, which helped them to improve its quality and presentation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3005592">doi:10.1109/access.2020.3005592</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mcud4hd6dndwdhul4v6ueld6o4">fatcat:mcud4hd6dndwdhul4v6ueld6o4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429000416/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09127942.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ca/7e/ca7e57f943e86601875309d310d5d96a8dd95633.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3005592"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol [chapter]

Talal Alharbi, Abdullah Almuhaideb, Phu Dung Le
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The scheme provides mutual authentication. Proof.  ...  The proposed scheme provides the user's privacy and anonymity. Proof. The MU's personal details are kept secretly with the HN.  ...  Noriaki from Monash University for the valuable comments and suggestions that improve the presentation of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17650-0_10">doi:10.1007/978-3-642-17650-0_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gpwl5xelnnatxfsmrk5itfsbi4">fatcat:gpwl5xelnnatxfsmrk5itfsbi4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200324063927/https://rd.springer.com/content/pdf/10.1007%2F978-3-642-17650-0_10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/e3/1be3ba503bfe257307e744f3de865daa35bb2df7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17650-0_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An improved WBSN key-agreement protocol based on static parameters and hash functions

Behrooz Khadem, Amin Masoumi Suteh, Musheer Ahmad, Ahmed Alkhayyat, Mohammad Sabzinejad Farash, Hany S Khalifa
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
INDEX TERMS Authentication, anonymity, formal verification, unlinkability, wireless body sensor network.  ...  The current study, considering the security issues of the Li et al. scheme and some of their new extensions, proposes an improved AKA protocol with anonymity and unlinkability of the sensor node sessions  ...  presented an authentication scheme for 6LoWPAN (LAS-6LE) environments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3083708">doi:10.1109/access.2021.3083708</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h5zprtsfsncnpc4vhbwuqyqa6q">fatcat:h5zprtsfsncnpc4vhbwuqyqa6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210730025955/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09440452.pdf?tp=&amp;arnumber=9440452&amp;isnumber=9312710&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c6/48/c648d01a0a91fe118c274a13cb24f15b5e788681.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3083708"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS

Chun-Ta Li
<span title="2012-04-24">2012</span> <i title="Publishing House Technologija"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7og4indwyvastaeh3sjmrjhj34" style="color: black;">Information Technology and Control</a> </i> &nbsp;
In 2011, Yoon et al. proposed a user friendly authentication scheme with user anonymity for wireless communications and claimed that their scheme is secure and efficient using for battery-powered mobile  ...  In terms of convenience requirements, mobile communications have become one of the most important roaming services for wireless environments.  ...  Acknowledgment The authors would like to express their appreciation to the anonymous referees for their valuable suggestions and comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5755/j01.itc.41.1.1024">doi:10.5755/j01.itc.41.1.1024</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yhzw56jppjdfte36n5ocl36yvy">fatcat:yhzw56jppjdfte36n5ocl36yvy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200210165532/http://itc.ktu.lt/index.php/ITC/article/download/1024/1366" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ea/79/ea79ec5e4dc653d2145aef648a174937fe00cfba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5755/j01.itc.41.1.1024"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET

Abubakar M. Baba, Department of Computer Engineering, Kaduna Polytechnic, Kaduna, Nigeria, Simon, T. Apeh, Kachikwu, B. Erameh, epartment of Computer Engineering University of Benin Benin-City, Nigeria, Department of Computer Engineering Kaduna Polytechnic, Kaduna, Nigeria
<span title="2021-12-15">2021</span> <i title="Creative Research Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x2v3ghdi2bgo3aufnfuqjzamia" style="color: black;">Advances in Multidisciplinary &amp; Scientific Research Journal Publication</a> </i> &nbsp;
This will be achieved by integrating a Modified Authenticated Anonymous Routing Protocol (MAASR) to a Trusted Management Scheme (TMS).  ...  Therefore, a highly secured Hybrid Trust-based Anonymous Authenticated Routing Protocol (HTBAARP) to mitigate flooding attacks is to be developed to avoid unauthorized access and to detect malicious nodes  ...  Authenticated Anonymous Secured Routing Protocol (AASR), develop and evaluate a trust-based management scheme, hybridize the trust-management scheme with the Modified Anonymous Authenticated Secured Routing  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22624/aims/abmic2021p12">doi:10.22624/aims/abmic2021p12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e2mwidlf75el5i32iuqkgpzva4">fatcat:e2mwidlf75el5i32iuqkgpzva4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220204215853/https://www.isteams.net/_files/ugd/185b0a_9572de45e8734b13b32a4dbb082d016c.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/8e/bd8ee9e197eb3e8b3deb6ef6442e3aa1ffbdcd6e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22624/aims/abmic2021p12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Key-Agreement Protocol Based on Static Parameters and Hash Functions [article]

Behrooz Khadem, Amin Masoumi, M. S. Farash
<span title="2020-10-17">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The present paper considers the security issues of the scheme proposed by Li et al. and some of its new extensions in order to propose a new AKA scheme with anonymity and unlinkability of the sensor node  ...  As such, designing authenticated key agreement (AKA) protocols is an important challenge in these networks.  ...  Acknowledgements Hereby, we would like to sincerely thank Mister Marko Kompara for his useful recommendations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2010.08769v1">arXiv:2010.08769v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pvk2fnabmrcgph2jeyu5hmuoly">fatcat:pvk2fnabmrcgph2jeyu5hmuoly</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201022042719/https://arxiv.org/pdf/2010.08769v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c9/4b/c94b20c4ea57fce1a9f47197497c25d000cda3a8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2010.08769v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks

Cheng Xu, Xiaohong Huang, Maode Ma, Hong Bao
<span title="2018-07-03">2018</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
Based on the elliptic curve public key cryptography algorithm, in this paper, we propose a new anonymous roaming authentication protocol for the Long Term Evolution-Advanced (LTE-A) supported vehicular  ...  Due to the mobility and the broadcast nature of wireless communication, security of the vehicular networks is a critical issue for the academia and industry.  ...  The ARHAP scheme can provide a local password authentication without a verification table. Proof. In the vehicles, an OBU can get ID and PW into the terminal to calculate * .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/6251219">doi:10.1155/2018/6251219</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zxavcqpylbgyplhmtarmduthsa">fatcat:zxavcqpylbgyplhmtarmduthsa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190219214708/http://pdfs.semanticscholar.org/1f1c/52ddd45dc8d3a4dc2c18cab0371fcb63414b.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1f/1c/1f1c52ddd45dc8d3a4dc2c18cab0371fcb63414b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/6251219"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

An IoT-Based Body Area Network in Medical Care System: Related Challenges and Issues

<span title="2019-11-10">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
unidentified key-sharing attacks for IoT foundation E-health.  ...  So there is a need of an efficient lightweight, secure verification system, providing important security levels against various attacks, such as attacks by impersonation, a man in the middle attack and  ...  cost Authentication and Key Agreement scheme for the wireless body Scheme to verify the security and area networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.l2545.119119">doi:10.35940/ijitee.l2545.119119</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y4esyoy4mncuxermdpf27xmxle">fatcat:y4esyoy4mncuxermdpf27xmxle</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220301112902/https://www.ijitee.org/wp-content/uploads/papers/v9i1/L25451081219.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/81/67/81671a16a2ffd6659850f14ad8a967fd90a4a35e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.l2545.119119"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks

Guangsong Li, Yang Wang, Bin Zhang, Siqi Lu
<span title="2020-09-08">2020</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/khqygtfojnby3jyh5obuwd7ko4" style="color: black;">Mobile Information Systems</a> </i> &nbsp;
Nowadays, it is still a major challenge to design a secure cross-domain authentication protocol for heterogeneous wireless networks with different security parameters.  ...  In this protocol, roaming users can select temporary authentication parameters according to the system parameters of the roaming domain to complete authentication and key agreement, and users are anonymous  ...  authentication protocol for wireless networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/2964562">doi:10.1155/2020/2964562</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2gbljxcoczgmllymgvbpagu4qa">fatcat:2gbljxcoczgmllymgvbpagu4qa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200918232826/http://downloads.hindawi.com/journals/misy/2020/2964562.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c2/f8/c2f81bb3fde0d339bb3c59df4ba98be881d44816.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/2964562"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 3,829 results