Filters








292 Hits in 8.4 sec

A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks

Ioannis G. Askoxylakis, Damien Sauveron, Konstantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/impi66kjjzedhmgysdjktesuwa" style="color: black;">2008 Second International Conference on Emerging Security Information, Systems and Technologies</a> </i> &nbsp;
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality.  ...  Security is one of the main issues for mobile ad hoc networks (MANETs) deployment.  ...  Securing ad hoc networks can be very challenging, mainly because of the dynamic topology and the vulnerability of the wireless links, which allows passive and active attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/securware.2008.42">doi:10.1109/securware.2008.42</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/securware/AskoxylakisSMTT08.html">dblp:conf/securware/AskoxylakisSMTT08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e7kmkryfjzg4zio3tmkxrymz3u">fatcat:e7kmkryfjzg4zio3tmkxrymz3u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808235113/http://damien.sauveron.fr/fileadmin/damiensauveron/publications/3329a193.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d0/19/d019cdf146fb42dc864d1e65506b9fd809d199ba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/securware.2008.42"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

Ioannis G. Askoxylakis, Theo Tryfonas, John May, Vasilios Siris, Apostolos Traganitis
<span title="">2011</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a5gjzjadkzbirdua4xdqipotp4" style="color: black;">EURASIP Journal on Wireless Communications and Networking</a> </i> &nbsp;
Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications.  ...  We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods.  ...  Acknowledgment This work was supported in part by the European Commission in the 7th Framework Programme through project EU-MESH (Enhanced, Ubiquitous, and Dependable Broadband Access using MESH Networks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2011/807684">doi:10.1155/2011/807684</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fividekka5ga5acdvsb3dn4jgm">fatcat:fividekka5ga5acdvsb3dn4jgm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705153745/http://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1155/2011/807684?site=jwcn.eurasipjournals.springeropen.com" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/6b/5c6be22da01c5040a7bfa4a268dcafd2123f921a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2011/807684"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks [chapter]

Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theo Tryfonas, John May, Apostolos Traganitis
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jajl7qtqc5cy7oavratsldrv2y" style="color: black;">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</a> </i> &nbsp;
Mobile ad hoc networking is an operating mode for rapid mobile node networking. Each node relies on adjacent nodes in order to achieve and maintain connectivity and functionality.  ...  Security is considered among the main issues for the successful deployment of mobile ad hoc networks (MANETs).  ...  For a given security level, elliptic curve cryptography raises computational speed and this is important in ad hoc networks, where the majority of the clients have limited resources.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03819-8_11">doi:10.1007/978-3-642-03819-8_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v5zvocjj6jeznjjqa7yx4xgypq">fatcat:v5zvocjj6jeznjjqa7yx4xgypq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706021423/http://users.ics.forth.gr/%7Easko/pdfs/Conference%20Papers/2009/MOBILIGHT%202009.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/a3/c0a34d9c49270a767e7ba39cc94e962a029b0570.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03819-8_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography

Prabhdeep Kaur, Sheetal Kalra
<span title="2015-04-27">2015</span> <i title="Chitkara University Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/grr6gv2sqvdk7b3ti5cnawndwq" style="color: black;">Journal of Technology Management for Growing Economies</a> </i> &nbsp;
In this paper, we have analyzed some of the recent password based authentication and key agreement schemes using ECC for various environments.  ...  Secure and efficient mutual authentication and key agreement schemes form the basis for any robust network communication system.  ...  Due to this commercialization, ECC based technology is finding applicability in wired and wireless networks, mobile ad-hoc networks, Internet of Things (IoT), radio frequency identification, Wireless Body  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15415/jtmge.2015.61004">doi:10.15415/jtmge.2015.61004</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bldktspbibdtvioxpmwnvrraoe">fatcat:bldktspbibdtvioxpmwnvrraoe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307033445/https://tmg.chitkara.edu.in/index.php/tmge/article/download/52/33" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b0/e3/b0e307ccb50ab7e3e2b1de06f2049a254c44cd25.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15415/jtmge.2015.61004"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

Mostafa farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amirhossein Mohajerzadeh
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie-Hellman).  ...  INDEX TERMS Authentication, wireless sensor networks, key agreement, ECDH, security, privacy.  ...  [25] provided user authentication and key agreement protocol for heterogeneous ad hoc wireless sensor networks and the second a secure temporal-credential based mutual authentication and key agreement  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2987764">doi:10.1109/access.2020.2987764</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/q7nj5bw2pbgg3o6j4i6uqooll4">fatcat:q7nj5bw2pbgg3o6j4i6uqooll4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108071635/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09064727.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/6f/4b6f1fd983dfab6a66f6af8789732189fedbd100.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2987764"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Network Security System with Optimized Randomized Multiple Key Exchange Algorithm

<span title="2020-01-10">2020</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
The proposed three algorithms namely 1) Modified Simple Password Key Exchange Scheme 2) Modified Diffie-Hellman Key exchange Scheme 3) Modified Elliptic Curve Scheme are meant to provide shared secret  ...  in proving authentication for the cryptographic identification of networks  ...  Biometric security methods can be used in addition with the proposed system. The system can be extended to use with ad-hoc networks also.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b6849.019320">doi:10.35940/ijitee.b6849.019320</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hcibov3rnng2xasgc5iq7g3zku">fatcat:hcibov3rnng2xasgc5iq7g3zku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220225100336/https://www.ijitee.org/wp-content/uploads/papers/v9i3/B6849129219.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/18/7d18418cdbbecd644c02bf195c74360fca5ee9c2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b6849.019320"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Key agreement for heterogeneous mobile ad-hoc groups

Mark Manulis, Ahmad Reza Sadeghi
<span title="">2010</span> <i title="Inderscience Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pficuraxijgwlemz2bbgjdvh7y" style="color: black;">International Journal of Wireless and Mobile Computing</a> </i> &nbsp;
Our protocols are based on elliptic curve cryptography (ECC) to achieve better computation efficiency and are proven secure. * This is a full version of the  ...  In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations, e.g., laptops, PDAs,  ...  Acknowledgements The author is thankful to Ahmad-Reza Sadeghi, Andre Adelsbach and Jörg Schwenk for their comments on this topic.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijwmc.2010.030972">doi:10.1504/ijwmc.2010.030972</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vd3xh4xy3bbpvms3skqvx7zmye">fatcat:vd3xh4xy3bbpvms3skqvx7zmye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812011600/http://www.ruhr-uni-bochum.de/nds/manulis/papers/HGKA.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/bb/80bb09622b6bbdfaecbc08360a2895724ddde770.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijwmc.2010.030972"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications

Ting Yi Chang, Min Shiang Hwang
<span title="">2011</span> <i title="Inderscience Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/i74jub5ryzde5e5wnwahnmn5fe" style="color: black;">International Journal of Mobile Communications</a> </i> &nbsp;
Under the random oracle model and the elliptic curve version of the computational Diffie-Hellman assumption, the proposed system is demonstrated to be provably secure against active adversaries.  ...  There are occasions when some people carry their portable devices to a hotel room or office to hold a short-term conference over wireless networks.  ...  In an ad hoc network, there is no fixed mobile switching center or base station.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijmc.2011.040143">doi:10.1504/ijmc.2011.040143</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/utivugww2nfpbjbrmwew4hhwxe">fatcat:utivugww2nfpbjbrmwew4hhwxe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829122745/http://isrc.ccs.asia.edu.tw/www/myjournal/P114.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/07/b80734650611500d21d79322a9cde00cca5bc888.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijmc.2011.040143"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Editorial "Secure Multimedia Communication in Vehicular Adhoc Network"

Aneel Rahim, Muhammad Sher, Zeeshan Shafi Khan, Fahad Bin Muhaya
<span title="2013-05-26">2013</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7inqmh346zfjjizjyieh7ijtma" style="color: black;">Multimedia tools and applications</a> </i> &nbsp;
Arshad et al. and titled as "Elliptic curve cryptography based mutual authentication scheme for session initiation protocol".  ...  Multimedia Communication in VANETs is prone to security attack due to lack of infrastructure, mobility and dynamic network topology as compare to any other network Several Security attacks are possible  ...  Hsin-Te Wu et al. written an article with title as "RSU-based message authentication for vehicular ad-hoc networks".  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11042-013-1495-8">doi:10.1007/s11042-013-1495-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oclp5tnlqjaexhg4fpegu7fwza">fatcat:oclp5tnlqjaexhg4fpegu7fwza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725100535/https://link.springer.com/content/pdf/10.1007%2Fs11042-013-1495-8.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/13/95/13957e4a247f89c85a42c0021b1737ad644e284e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11042-013-1495-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

CPFP: An efficient key management scheme for large scale personal networks

Shahab Mirzadeh, Rahim Tafazolli, Frederik Armknecht, Jordi Jaen Pallares, Hossam Afifi
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3pu7lmyajze3vanb7nosybd3b4" style="color: black;">2008 3rd International Symposium on Wireless Pervasive Computing</a> </i> &nbsp;
PKI) concept and Elliptic Curve Cryptography (ECC) techniques.  ...  This paper provides an efficient key management scheme for large scale personal networks (PN) and introduces the Certified PN Formation Protocol (CPFP) based on a personal public key infrastructure (personal  ...  ACKNOWLEDGMENT The authors are grateful of all the partners involved in the projects MAGNET and MAGNET-Beyond, especially workpackages 4, for their fruitful discussions and collaborations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iswpc.2008.4556309">doi:10.1109/iswpc.2008.4556309</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iswpc/MirzadehTAPA08.html">dblp:conf/iswpc/MirzadehTAPA08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/adu6cie34zcpfmjulyd6uyvtti">fatcat:adu6cie34zcpfmjulyd6uyvtti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720220041/http://epubs.surrey.ac.uk/2330/1/SRF002323.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e1/7e/e17e2b358f254c1aa886cf44f3180f14f5a4f281.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iswpc.2008.4556309"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

User Authentication Techniques for Wireless Sensor Networks : A Survey

Shakera Shaikh, Veena Gulhane
<span title="">2012</span> <i title="Institute for Project Management Pvt. Ltd"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jm3ap4zp2ne7npciuwyd22yhca" style="color: black;">International Journal of Smart Sensor and Adhoc Network.</a> </i> &nbsp;
This paper synthesizes existing user authentication schemes in wireless sensor networks and highlights the challenges in user authentication.  ...  A wireless sensor network(WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments.  ...  User Authentication Techniques for Wireless Sensor Networks : A Survey International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248-9738 Vol-2, Issue-2 85 Scheme Authentic atiobn  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijssan.2012.1142">doi:10.47893/ijssan.2012.1142</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zxdvg423ezgvlgt33h5453nc3i">fatcat:zxdvg423ezgvlgt33h5453nc3i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201228094609/https://www.interscience.in/cgi/viewcontent.cgi?article=1142&amp;context=ijssan" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/0c/f90c9d5998345851bbf0eb2f2f2fd4b32b9251c2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijssan.2012.1142"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

K Archana, Mrs. Shubangini Patil
<span title="2018-06-30">2018</span> <i title="South Asia Management Association"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/oarwpnpqjjfbbkyptszxdp4ch4" style="color: black;">International Journal of Trend in Scientific Research and Development</a> </i> &nbsp;
It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution.  ...  In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme.  ...  An Efficient Hierarchical Group Key Management Protocol for Mobile Ad-Hoc Networks (2009):DAWOOD, MNENEY, AGHDASI AND DAWOUD [5]: In this paper it is said that a mobile ad hoc network (MANET) is a collection  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31142/ijtsrd14486">doi:10.31142/ijtsrd14486</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cepuhtoxirhezb2s27kt5xlv6q">fatcat:cepuhtoxirhezb2s27kt5xlv6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220310120616/https://www.ijtsrd.com/papers/ijtsrd14486.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/64/00/6400c04c95c3d3cc707a0b60a1e877d5632f0964.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31142/ijtsrd14486"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Sanaz Kavianpour, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, Friso De Boer
<span title="2019-08-29">2019</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yu54alqdrrhvxngt7z3est7dbm" style="color: black;">Journal of Computer Networks and Communications</a> </i> &nbsp;
Integration of authentication technologies with IoT ensures secure data retrieval and robust access control.  ...  User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely.  ...  For instance, in wireless sensor networks, they are based on elliptic curve cryptography [12] , self-certified keys cryptosystem [13] , and hash functions [14] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/5747136">doi:10.1155/2019/5747136</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dps6x5rtlrgznhi5rjuv4dtlji">fatcat:dps6x5rtlrgznhi5rjuv4dtlji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200208113015/http://downloads.hindawi.com/journals/jcnc/2019/5747136.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/81/3f/813f246f623297ad9bb0c5a4e49055f706bf6cd5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/5747136"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT

B D Deebak, Fadi Al-Turjman, Moayad Aloqaily, Omar Alfandi
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Since the IIoT environment gathers and transmits the data over insecure public networks, a promising solution known as authentication and key agreement (AKA) is preferred to prevent illegal access.  ...  INDEX TERMS Authentication and key agreement, internet of medical things, security protection and privacy user authentication, random-oracle model and resource analysis, e-healthcare application, biometrics  ...  2 = 0 Assume that the elliptic-curve cryptosystem is based on G F (q) that can translate the systems using elliptic-curve group EC g .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2941575">doi:10.1109/access.2019.2941575</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g2angctqjvfhjaelbmwzrzfini">fatcat:g2angctqjvfhjaelbmwzrzfini</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717115926/https://ieeexplore.ieee.org/ielx7/6287639/8600701/08839043.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9c/76/9c76490a8a300089f9d447eefbc7baaf8b863adf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2941575"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad hoc Networks

Muhammad Asghar Khan, Insaf Ullah, Neeraj Kumar, Omar Sami Oubbati, I. Qureshi, Fazal Noor, Fahim Ullah
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fmebo7gm4vhg7ljs3x2bbrazk4" style="color: black;">IEEE Transactions on Vehicular Technology</a> </i> &nbsp;
Our contribution, in this paper, is a certificate-based access control and key agreement scheme, which is based on the technique of Hyperelliptic Curve Cryptography (HECC) and employs a collision-resistant  ...  The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single large drone to multiple small drones linked together in an ad-hoc fashion.  ...  Although a FANET system is characterized by an ad-hoc mechanism, some of its features distinguish it from the predecessor ad-hoc networks, such as Mobile Ad-hoc Networks (MANETs) and Vehicular Ad-hoc Networks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvt.2021.3055895">doi:10.1109/tvt.2021.3055895</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pszv34o2w5hrfk3pqizbhguc7e">fatcat:pszv34o2w5hrfk3pqizbhguc7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717184142/https://hal.archives-ouvertes.fr/hal-03174740/file/09345380_2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e3/5b/e35b422822f6f2379bbac83ff6c1f7a2f8da3653.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvt.2021.3055895"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 292 results