Search

Your search keyword '"key agreement"' showing total 1,367 results

Search Constraints

Start Over You searched for: Descriptor "key agreement" Remove constraint Descriptor: "key agreement"
1,367 results on '"key agreement"'

Search Results

1. Secret Sharing Based Key Agreement Protocol for Body Area Networks

3. Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks.

4. Secure and lightweight key agreement protocol for remote surgery over tactile internet using physically unclonable functions.

5. Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment.

6. Quantum-secure content key delivery mechanism for DRM system.

7. Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET.

8. Comment on “Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems”.

9. Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture

10. Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems.

11. IHKM: an improved hierarchical key management scheme for wireless sensor network.

12. Highly secure authentication and key agreement protocol for the internet of vehicles.

13. Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture.

14. Lightweight Two-Party Authentication Key Agreement Protocol.

15. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication.

16. Design issues in "a secure and efficient key agreement framework for critical energy infrastructure using mobile device".

17. RELAKA: Robust ECC based Privacy Preserving Lightweight Authenticated Key Agreement protocol for healthcare applications

18. LATKE: A Framework for Constructing Identity-Binding PAKEs

19. Secured Authentication Scheme for E-Healthcare in SIoT Using ECC and Improved Hash Function

20. Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV

21. A Construction of Secure and Efficient Authenticated Key Exchange Protocol for Deploying Internet of Drones in Smart City

22. A Practical and UC-Secure Decentralized Key Management and Authentication Scheme Based on Blockchain for VNDN.

23. Blockchain based authentication and access control protocol for IoT.

24. A new authentication scheme for dynamic charging system of electric vehicles in fog environment.

25. Provably secure lightweight certificateless lattice‐based authenticated key exchange scheme for IIoT.

26. REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare.

27. PKIF-AKA: A Public Key Infrastructure Free Authenticated Key Agreement Protocol for Smart Grid Communication.

28. 基于超晶格 PUF 的轻量级信息论安全密钥达成协 议.

29. A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments

30. Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network

31. Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications

32. Concurrent Two-Party Key Exchange With Forward Unlinkability in Internet of Drones

33. A New Identity Authentication and Key Agreement Protocol Based on Multi-Layer Blockchain in Edge Computing

35. A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT.

36. A Lightweight Chaotic Map-Based Key Agreement Scheme for the Advanced Metering Infrastructure.

37. A secure signature‐based access control and key management scheme for fog computing‐based IoT‐enabled big data applications.

38. A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN.

39. Extended chaotic map-based key management for hierarchical access control in e-medicine systems.

40. Privacy in Smart Homes with Remote User Authenticated Key Establishment Protocol.

41. Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network.

42. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.

43. A Noval and Efficient Three-Party Identity Authentication and Key Negotiation Protocol Based on Elliptic Curve Cryptography in VANETs.

44. Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks.

45. A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm

46. An Improved Certificateless Authentication Key Agreement Protocol

47. A Novel Post-quantum Piekert’s Reconciliation-Based Forward Secure Authentication Key Agreement for Mobile Devices

Catalog

Books, media, physical & digital resources