scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "KEY agreement protocols (Computer network protocols)"

1 - 10 of 927 results for
 "KEY agreement protocols (Computer network protocols)"
Results per page:

Active Authentication Protocol for IoV Environment with Distributed Servers.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 3, p5789-5808. 20p.

Abstract: The Internet of Vehicles (IoV) has evolved as an advancement over the conventional Vehicular Ad-hoc Networks (VANETs) in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of ap...

Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment.

Publication Type: Academic Journal

Source(s): CMES-Computer Modeling in Engineering & Sciences. 2023, Vol. 134 Issue 1, p317-341. 25p.

Abstract: The development of the Internet of Things has facilitated the rapid development of various industries. With the improvement in people's living standards, people's health requirements are steadily improving. However, owing to the scarcity of medical and...

Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 72 Issue 3, p4789-4802. 14p.

Abstract: Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control cente...

Extremely Lightweight PUF-based Batch Authentication Protocol for End-Edge-Cloud Hierarchical Smart Grid.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 11/29/2022, p1-14. 14p.

Abstract: Smart grid is gradually replacing traditional grid with two-way communication and improved management. Besides the efficiency and reliability it brings, the smart grid is inevitably fraught with rampant physical and cyber-attack. Although several physi...

Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 7/12/2022, p1-19. 19p.

Authors:

Abstract: Security analysis of security protocol can be used to ensure communication security in the network. The process of security protocol analysis using the formal analysis method is simple and standardized, which is a research hotspot in the field of infor...

Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 6/15/2022, p1-11. 11p.

Abstract: Real-time and high-efficient communication becomes a vital property for IoT-enabled equipment, since the application range of the Internet of Things has extended widely. At the same time, the centralized characterization of the cloud computing is gradu...

IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 7/21/2022, p1-24. 24p.

Abstract: The Signal Protocol is one of the most popular privacy protocols today for protecting Internet chats and supports end-to-end encryption. Nevertheless, despite its many advantages, the Signal Protocol is not resistant to Man-In-The-Middle (MITM) attacks...

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 7/30/2022, p1-18. 18p.

Abstract: RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concer...

Cryptanalysis and Improvements on Quantum Key Agreement Protocol Based on Quantum Search Algorithm.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 3/17/2022, p1-5. 5p.

Abstract: Recently, Huang et al. (2021) presented a quantum key agreement schemeto securely negotiate on a secret key employing the properties of a quantumsearch algorithm. First, the authors proposed the two-party quantum key agreement, and then they extended t...

LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.

Publication Type: Academic Journal

Source(s): Computer Communications. Jan2023, Vol. 197, p214-229. 16p.

Abstract: As a supplement to terrestrial networks, satellite communication networks have a lot of advantages, such as wide coverage, large communication capacity, reliable communication quality, and seamless global connectivity, which are highly competitive with...

sponsored