Computation-Communication Trade-off for Power and Bandwidth Savings in Remote Authentication over Wireless Networks (original) (raw)
Related papers
Mutual Authentication for Low-Power Mobile Devices
Lecture Notes in Computer Science, 2002
A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices
Lecture Notes in Computer Science, 2004
On the energy cost of authenticated key agreement in wireless sensor networks
Wireless Communications and Mobile Computing, 2012
A Certificate-based Lightweight Authentication Algorithm For Resource-constrained Devices
Authenticating Pervasive Devices with Human Protocols
Advances in Cryptology – CRYPTO 2005, 2005
The communication and computation cost of wireless security
2011
Power consumption evaluation of efficient digital signature schemes for low power devices
WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., 2005
An Evaluation of the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks
ZEBRA: Zero-Effort Bilateral Recurring Authentication
2014 IEEE Symposium on Security and Privacy, 2014
A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol
IEEE Access
Proceedings of the International Conferences Big Data Analytics, Data Mining and Computational Intelligence 2019; and Theory and Practice in Modern Computing 2019, 2019
Increasing Security of Mobile Devices by Decreasing User Effort in Verification
Heikki Ailisto, Elena Vildjiounaite
2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Health Informatics Journal, 2010
International Journal of Computer Theory and Engineering, 2013
Distance-Avoiding Sequences for Extremely Low-Bandwidth Authentication
Lecture Notes in Computer Science, 2008
IEEE Access, 2022
Efficient Password-Authenticated Key Exchange Based on RSA
Lecture Notes in Computer Science, 2006
Data-Minimizing Authentication Goes Mobile
Communications and Multimedia Security, 2012
IEEE Transactions on Wireless Communications, 2009
A secure signature validation architecture prototype
In-field Remote Fingerprint Authentication using Human Body Communication and On-Hub Analytics
2018
On the Security of ‘An Efficient Biometric Authentication Protocol for Wireless Sensor Networks’
Energy efficient authentication strategies for network coding
Concurrency and Computation: Practice and Experience, 2012
EURASIP Journal on Wireless Communications and Networking, 2011
The Energy Budget for Wireless Security: Extended Version
IACR Cryptology ePrint Archive, 2015
Recognition in a Low-Power Environment
A Study of the Energy ConsumptionCharacteristics of CryptographicAlgorithms and Security Protocols
Efficient batch authentication for hierarchical wireless sensor networks
Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2011), 2011