An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks (original) (raw)

Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks

Dulal Kar

2013

View PDFchevron_right

Information Security Journal: A Global Perspective A secure and privacy-preserving lightweight authentication protocol for wireless communications

Sunday O Ogundoyin, Ismaila A Kamil

View PDFchevron_right

A lightweight identity authentication protocol for wireless networks

Pascal Urien

Computer Communications, 2004

View PDFchevron_right

A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks

William Farrelly

International Journal of Information Security and Privacy, 2014

View PDFchevron_right

A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification

William Farrelly

Research Anthology on Artificial Intelligence Applications in Security, 2021

View PDFchevron_right

Identity based secure communication over wireless network using NTEA

Iasir Journals

View PDFchevron_right

Lightweight security framework for IoTs using identity based cryptography

Sriram Sankaran

2016

View PDFchevron_right

An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures

Ankit Kabra

Computer and Information …, 2010

View PDFchevron_right

A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks

Charu Wahi

IJARCCE, 2017

View PDFchevron_right

Identity Based Authentication using a Cross Layer Design approach in Wireless Sensor Networks

Stephen Szygenda

2011

View PDFchevron_right

Low energy identity-based trusted access control scheme for Wireless Sensor Network

Ezril Hisham Mat Saad, Habibah Hashim, Yusnani Yussoff

2011

View PDFchevron_right

Identity-Based Encryption Protocol for Privacy and Authentication in Wireless Networks

Dulal Kar

Design and Applications, 2014

View PDFchevron_right

Routing in Wireless Sensor Networks Using Identity-Based Cryptography

Harsh Patil

Security for Wireless Sensor Networks using Identity-Based Cryptography, 2012

View PDFchevron_right

Lightweight authentication for user access to Wireless Sensor networks

Ahmad Azarnik

View PDFchevron_right

Secure Routing in Wireless Sensor Networks using Identity-based Cryptography

Stephen Szygenda

View PDFchevron_right

An identity-based authentication protocol for sensor networks

Adnan Al-anbuky

2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014

View PDFchevron_right

An identity based key management scheme in wireless sensor networks

Ashok Kumar Das

View PDFchevron_right

On application of Host Identity Protocol in wireless sensor networks

Dmitriy Kuptsov

2010

View PDFchevron_right

An EAP ID-Based Authentication Method for Wireless Networks

maryline laurent

View PDFchevron_right

An Efficient Authentication Scheme for Internet of Things

Haya Joudeh

International Journal of Communication Networks and Information Security (IJCNIS)

View PDFchevron_right

Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography

Rubaiyat Islam Rafat

International Journal of Computer and Communication Engineering, 2014

View PDFchevron_right

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

Juryon Paik

PloS one, 2015

View PDFchevron_right

A Lightweight and Identity-Based Network Architecture for the Internet of Things

Antonio Skarmeta

2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

View PDFchevron_right

Identity-based Trusted Authentication in Wireless Sensor Networks

Yusnani Yussoff

2014

View PDFchevron_right

A Secure Authentication mechanism for Wireless Sensor Networks

IOSR Journals

View PDFchevron_right

A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks

Pardeep Kumar

ETRI Journal, 2013

View PDFchevron_right

A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices

Phongsak Keeratiwintakorn

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks

Mrudula Sarvabhatla

Wireless Personal Communications, 2017

View PDFchevron_right

Identity-Based Encryption for Sensor Networks

Felipe Daguano

2007

View PDFchevron_right

Identity-based trusted authentication in wireless sensor network

Mohd Dani Baba

arXiv preprint arXiv:1207.6185, 2012

View PDFchevron_right

A Certificate-based Lightweight Authentication Algorithm For Resource-constrained Devices

Ayan Roy-Chowdhury

View PDFchevron_right

An ID-based User Authentication Scheme for Wireless Sensor Networks using ECC

Amira Mnif, Cheikhrouhou Omar

View PDFchevron_right

Lightweight authentication and key management of wireless sensor networks for Internet of things

Pawani Porambage

2018

View PDFchevron_right

Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks

Yusnani Mohd Yussoff

International Journal of Wireless and Microwave Technologies, 2011

View PDFchevron_right

An efficient authentication framework for wireless sensor networks

Rehana Yasmin

2012

View PDFchevron_right