Computation-Communication Trade-off for Power and Bandwidth Savings in Remote Authentication over Wireless Networks (original) (raw)

Mutual Authentication for Low-Power Mobile Devices

Markus Jakobsson

Lecture Notes in Computer Science, 2002

View PDFchevron_right

A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices

Phongsak Keeratiwintakorn

Lecture Notes in Computer Science, 2004

View PDFchevron_right

On the energy cost of authenticated key agreement in wireless sensor networks

Javier Miranda López

Wireless Communications and Mobile Computing, 2012

View PDFchevron_right

A Certificate-based Lightweight Authentication Algorithm For Resource-constrained Devices

Ayan Roy-Chowdhury

View PDFchevron_right

Authenticating Pervasive Devices with Human Protocols

reza aghamohammadi

Advances in Cryptology – CRYPTO 2005, 2005

View PDFchevron_right

The communication and computation cost of wireless security

Stefaan Seys

2011

View PDFchevron_right

Power consumption evaluation of efficient digital signature schemes for low power devices

Stefaan Seys

WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., 2005

View PDFchevron_right

An Evaluation of the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks

rodri prats

View PDFchevron_right

ZEBRA: Zero-Effort Bilateral Recurring Authentication

ronald peterson

2014 IEEE Symposium on Security and Privacy, 2014

View PDFchevron_right

A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol

Sajjad Baghaee

IEEE Access

View PDFchevron_right

An Energy-Efficient Random Fingerprint and Verification for Wireless Sensor Networks Authentication Protocols

Youssou Faye

Proceedings of the International Conferences Big Data Analytics, Data Mining and Computational Intelligence 2019; and Theory and Practice in Modern Computing 2019, 2019

View PDFchevron_right

Increasing Security of Mobile Devices by Decreasing User Effort in Verification

Heikki Ailisto, Elena Vildjiounaite

2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

View PDFchevron_right

Securing the communication of medical information using local biometric authentication and commercial wireless links

John Baras

Health Informatics Journal, 2010

View PDFchevron_right

Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography

Habib Ullah

International Journal of Computer Theory and Engineering, 2013

View PDFchevron_right

Distance-Avoiding Sequences for Extremely Low-Bandwidth Authentication

Scott Mitchell

Lecture Notes in Computer Science, 2008

View PDFchevron_right

Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography using Biometric Authentication

Khouloud Eledlebi

IEEE Access, 2022

View PDFchevron_right

Efficient Password-Authenticated Key Exchange Based on RSA

Moti Yung

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Data-Minimizing Authentication Goes Mobile

Bart De Decker

Communications and Multimedia Security, 2012

View PDFchevron_right

Efficient multi-party digital signature using adaptive secret sharing for low-power devices in wireless networks

Anthony T Chronopoulos

IEEE Transactions on Wireless Communications, 2009

View PDFchevron_right

A secure signature validation architecture prototype

Daniela López De Luise

View PDFchevron_right

In-field Remote Fingerprint Authentication using Human Body Communication and On-Hub Analytics

DEBAYAN DAS

2018

View PDFchevron_right

On the Security of ‘An Efficient Biometric Authentication Protocol for Wireless Sensor Networks’

Ashok Kumar Das

View PDFchevron_right

Energy efficient authentication strategies for network coding

Claire Goursaud

Concurrency and Computation: Practice and Experience, 2012

View PDFchevron_right

Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless/Satellite Networks

Ayan Roy-Chowdhury

EURASIP Journal on Wireless Communications and Networking, 2011

View PDFchevron_right

The Energy Budget for Wireless Security: Extended Version

Stefaan Seys

IACR Cryptology ePrint Archive, 2015

View PDFchevron_right

Recognition in a Low-Power Environment

Guy Fawkes

View PDFchevron_right

A Study of the Energy ConsumptionCharacteristics of CryptographicAlgorithms and Security Protocols

Ruby B. Lee

View PDFchevron_right

Efficient batch authentication for hierarchical wireless sensor networks

Jarrod Trevathan

Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2011), 2011

View PDFchevron_right