Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography (original) (raw)

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks

Ruhul Amin

2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015

View PDFchevron_right

Evaluation of Authentication Algorithms for Small Devices

Georg Carle

2004

View PDFchevron_right

Ownership authentication transfer protocol for ubiquitous computing devices

Sanjay Singh

2013 International Conference on Computer Communication and Informatics, ICCCI 2013, 2013

View PDFchevron_right

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications

Pawani Porambage

2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014

View PDFchevron_right

User authentication schemes for mobile and handheld devices

Naveen kumar

View PDFchevron_right

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography

dipanwita sadhukhan

The Journal of Supercomputing, 2020

View PDFchevron_right

Designing Security Protocols Adapted to the Constraints of Mobile Environments

Michel RIVEILL

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010

View PDFchevron_right

Lightweight mutual authentication protocol for securing RFID applications

Eslam Gamal

International Journal of Internet Technology and Secured Transactions, 2010

View PDFchevron_right

Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

Sanjay Singh

2012 International Conference on Innovations in Information Technology (IIT), 2012

View PDFchevron_right

Mutual Authentication and Key Exchange Protocol for Low Power Devices

Markus Jakobsson

Financial Cryptography, 2001

View PDFchevron_right

A Novel Multi-factor Authentication Protocol for Smart Home Environments

Sriram Sankaran

Information Systems Security, 2018

View PDFchevron_right

A new generic protocol for authentication and key agreement in lightweight systems

Olivier Markowitch

View PDFchevron_right

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags

A. Ribagorda

Lecture Notes in Computer Science, 2006

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Secure multi-factor remote user authentication scheme for Internet of Things environments

Parwinder Dhillon

International Journal of Communication Systems, 2017

View PDFchevron_right

A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices

Phongsak Keeratiwintakorn

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Physical layer authentication in wired and wireless communication systems

Sanjay Singh

Communications in Computer and Information Science, 2011

View PDFchevron_right

RSA-Based Handshake Protocol in Internet of Things

mao junye

2018 9th International Conference on Information Technology in Medicine and Education (ITME), 2018

View PDFchevron_right

User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context

benfilali mostefa, Belghachi Mohamed

Journal of communications software and systems, 2024

View PDFchevron_right

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments

Robert Huijie

IEEE Transactions on Vehicular Technology, 2006

View PDFchevron_right

Security for Ubiquitous Computing: Problems and Proposed Solutionl

Hùng Lê

12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06), 2006

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication protocol

Sin-Ban Ho

International Journal of Computer Applications, 2010

View PDFchevron_right

Mutual Authentication for Low-Power Mobile Devices

Markus Jakobsson

Lecture Notes in Computer Science, 2002

View PDFchevron_right

A New Authenticated Key Agreement Protocol

AbdAllah A . AlHabshy

New Technologies, Mobility and Security

View PDFchevron_right

Design of a Three-Factor Authentication and Key Agreement Scheme Using Biometric Approach for Internet of Things

Ayaz Hassan Moon

Research Square (Research Square), 2024

View PDFchevron_right

Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network

Pei-yih Ting

IEEE Systems Journal, 2017

View PDFchevron_right

Lightweight Cryptography: A Solution to Secure IoT

poonam jindal

Wireless Personal Communications, 2020

View PDFchevron_right

A Secure and Efficient Mutual Authentication Hand-off Protocol for Sensors Devices Support in Internet of Things

Bruce NDIBANJE

Sensors and Materials

View PDFchevron_right

ANALYSIS OF LIGHT WEIGHT SMART AUTHENTICATION PROTOCOL SCHEMES FOR EFFECTIVE COMMUNICATION IN SMART ENVIRONMENT

IAEME Publication

IAEME PUBLICATION, 2020

View PDFchevron_right

Two Factor Authentication Made Easy

Alex Q. Chen

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Symmetric key-based authenticated encryption protocol

Sanjay Singh

Information Security Journal: A Global Perspective, 2019

View PDFchevron_right

Authentication schemes for wireless sensor networks

Ali Chehab

MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference, 2014

View PDFchevron_right

User anonymity based trusted authentication scheme for wireless environment

Jerry Jerry U

2018

View PDFchevron_right

Efficient identity-based authenticated key agreement protocol from pairings

YOUNGJU CHOIE

Applied Mathematics and Computation, 2005

View PDFchevron_right

A Novel Biometric Approach for Authentication In Pervasive Computing Environments

Dr. D. H. Rao

Advanced Computational Intelligence: An International Journal (ACII), 2016

View PDFchevron_right

Clean energy technologies