Search

Your search keyword '"*KEY agreement protocols (Computer network protocols)"' showing total 23 results

Search Constraints

Start Over You searched for: Descriptor "*KEY agreement protocols (Computer network protocols)" Remove constraint Descriptor: "*KEY agreement protocols (Computer network protocols)" Journal international journal of communication systems Remove constraint Journal: international journal of communication systems
23 results on '"*KEY agreement protocols (Computer network protocols)"'

Search Results

1. An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks.

2. An enhanced secure delegation‐based anonymous authentication protocol for PCSs.

3. An efficient lightweight authentication scheme for human‐centered industrial Internet of Things.

4. Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme.

5. 5G, IoT, and edge computing convergence—Systems, services, and security.

6. An efficient hash‐based authentication protocol for wireless sensor networks in Internet of Things applications with forward secrecy.

7. ESS‐IBAA: Efficient, short, and secure ID‐based authentication algorithm for wireless sensor network.

8. An efficient anonymous user authentication and key agreement protocol for wireless sensor networks.

9. SEBAP:  A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing.

10. On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC.

11. A secure authentication and key agreement scheme for roaming service with user anonymity.

12. An improved lightweight multiserver authentication scheme.

13. An efficient chaos-based 2-party key agreement protocol with provable security.

14. Smart card-based password authenticated key agreement protocol using chaotic maps.

15. Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments.

16. Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol.

17. A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card.

18. An attribute-based tripartite key agreement protocol.

19. An efficient pairing-free identity-based authenticated group key agreement protocol.

20. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR.

21. Security analysis of an authentication and key agreement protocol for satellite communications.

22. A fault-tolerant group key agreement protocol exploiting dynamic setting.

23. An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment.

Catalog

Books, media, physical & digital resources