Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography (original) (raw)
Related papers
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015
Evaluation of Authentication Algorithms for Small Devices
2004
Ownership authentication transfer protocol for ubiquitous computing devices
2013 International Conference on Computer Communication and Informatics, ICCCI 2013, 2013
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014
User authentication schemes for mobile and handheld devices
The Journal of Supercomputing, 2020
Designing Security Protocols Adapted to the Constraints of Mobile Environments
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010
Lightweight mutual authentication protocol for securing RFID applications
International Journal of Internet Technology and Secured Transactions, 2010
2012 International Conference on Innovations in Information Technology (IIT), 2012
Mutual Authentication and Key Exchange Protocol for Low Power Devices
Financial Cryptography, 2001
A Novel Multi-factor Authentication Protocol for Smart Home Environments
Information Systems Security, 2018
A new generic protocol for authentication and key agreement in lightweight systems
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags
Lecture Notes in Computer Science, 2006
HANDBOOK of APPLIED CRYPTOGRAPHY
Secure multi-factor remote user authentication scheme for Internet of Things environments
International Journal of Communication Systems, 2017
A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices
Lecture Notes in Computer Science, 2004
Physical layer authentication in wired and wireless communication systems
Communications in Computer and Information Science, 2011
RSA-Based Handshake Protocol in Internet of Things
2018 9th International Conference on Information Technology in Medicine and Education (ITME), 2018
benfilali mostefa, Belghachi Mohamed
Journal of communications software and systems, 2024
IEEE Transactions on Vehicular Technology, 2006
Security for Ubiquitous Computing: Problems and Proposed Solutionl
12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06), 2006
A Comparison Study on Key Exchange-Authentication protocol
International Journal of Computer Applications, 2010
Mutual Authentication for Low-Power Mobile Devices
Lecture Notes in Computer Science, 2002
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Research Square (Research Square), 2024
Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network
IEEE Systems Journal, 2017
Lightweight Cryptography: A Solution to Secure IoT
Wireless Personal Communications, 2020
Sensors and Materials
IAEME PUBLICATION, 2020
Two Factor Authentication Made Easy
Lecture Notes in Computer Science, 2015
Symmetric key-based authenticated encryption protocol
Information Security Journal: A Global Perspective, 2019
Authentication schemes for wireless sensor networks
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference, 2014
User anonymity based trusted authentication scheme for wireless environment
2018
Efficient identity-based authenticated key agreement protocol from pairings
Applied Mathematics and Computation, 2005
A Novel Biometric Approach for Authentication In Pervasive Computing Environments
Advanced Computational Intelligence: An International Journal (ACII), 2016