Ara
Toplam kayıt 8, listelenen: 1-8
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2020)
The on demand availability of resources in Cyber physical system (CPS) has emerged as a viable service providing platform to improve the resource usability and reducing the infrastructure costs. Nevertheless, the development ...
An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)
Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure ...
Correcting "PALK: Password-based anonymous lightweight key agreement framework for smart grid"
(ELSEVIER SCI LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2021)
Very recently in 2020, Khan et al. proposed an authentication scheme (PALK) for the smart grid infrastructure.
Based on elliptic curve cryptography (ECC), symmetric hash functions and block cipher based encryption/
decryption ...
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
There are innumerable ways the Internet of Drones (IoD) technology can impact our society. With the
deployment of an airborne network, the IoD can support real-time low-cost delivery of services ranging from
military ...
A secure and improved multi server authentication protocol using fuzzy commitment
(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)
The advancement in communication and computation technologies has paved a way for
connecting large number of heterogeneous devices to offer specified services. Still, the
advantages of this advancement are not realized ...
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing
IoT applications that ...
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the ...
A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
Recently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has
gained attention as marine operations have increased substantially. Using modern information network technologies ...