Found: 47
Select item for more details and to access through your institution.
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 1668, doi. 10.1007/s11227-023-05535-2
- By:
- Publication type:
- Article
MDSbSP: a search protocol based on MDS codes for RFID-based Internet of vehicle.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 2, p. 1094, doi. 10.1007/s11227-020-03302-1
- By:
- Publication type:
- Article
An improved low-cost yoking proof protocol based on Kazahaya’s flaws.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 5, p. 1934, doi. 10.1007/s11227-017-2200-x
- By:
- Publication type:
- Article
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 1, p. 71, doi. 10.1007/s11227-017-2106-7
- By:
- Publication type:
- Article
Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 8, p. 3579, doi. 10.1007/s11227-017-1959-0
- By:
- Publication type:
- Article
Exploiting statistical effective fault attack in a blind setting.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 639, doi. 10.1049/ise2.12121
- By:
- Publication type:
- Article
Toward Designing a Secure Authentication Protocol for IoT Environments.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 7, p. 5934, doi. 10.3390/su15075934
- By:
- Publication type:
- Article
Practical fault resilient hardware implementations of AES.
- Published in:
- IET Circuits, Devices & Systems (Wiley-Blackwell), 2019, v. 13, n. 5, p. 596, doi. 10.1049/iet-cds.2018.5235
- By:
- Publication type:
- Article
A secure search protocol for lightweight and low-cost RFID systems.
- Published in:
- Telecommunication Systems, 2018, v. 67, n. 4, p. 539, doi. 10.1007/s11235-017-0351-y
- By:
- Publication type:
- Article
Two RFID Standard-based Security Protocols for Healthcare Environments.
- Published in:
- Journal of Medical Systems, 2013, v. 37, n. 5, p. 1, doi. 10.1007/s10916-013-9962-3
- By:
- Publication type:
- Article
On the Designing of a Tamper Resistant Prescription RFID Access Control System.
- Published in:
- Journal of Medical Systems, 2012, v. 36, n. 6, p. 3995, doi. 10.1007/s10916-012-9872-9
- By:
- Publication type:
- Article
ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 2, p. 937, doi. 10.3390/s23020937
- By:
- Publication type:
- Article
IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function".
- Published in:
- Sensors (14248220), 2018, v. 18, n. 12, p. 4444, doi. 10.3390/s18124444
- By:
- Publication type:
- Article
Security Analysis of Zipper Hash Against Multicollisions Attacks.
- Published in:
- Engineering, Technology & Applied Science Research, 2012, v. 2, n. 3, p. 226, doi. 10.48084/etasr.17
- By:
- Publication type:
- Article
A Recurrent Temporal Model for Semantic Levels Categorization Based on Human Visual System.
- Published in:
- Computational Intelligence & Neuroscience, 2021, p. 1, doi. 10.1155/2021/8895579
- By:
- Publication type:
- Article
Modification and hardware implementation of cortex‐like object recognition model.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2020, v. 14, n. 14, p. 3490, doi. 10.1049/iet-ipr.2019.0264
- By:
- Publication type:
- Article
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol.
- Published in:
- Future Internet, 2024, v. 16, n. 1, p. 9, doi. 10.3390/fi16010009
- By:
- Publication type:
- Article
On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems.
- Published in:
- Future Internet, 2018, v. 10, n. 9, p. 82, doi. 10.3390/fi10090082
- By:
- Publication type:
- Article
Multicollision Attack on a Recently Proposed Hash Function vMDC-2.
- Published in:
- Journal of Computing & Security, 2016, v. 3, n. 4, p. 211
- By:
- Publication type:
- Article
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol.
- Published in:
- Journal of Computing & Security, 2016, v. 3, n. 4, p. 201
- By:
- Publication type:
- Article
JHAE:ANovel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH.
- Published in:
- Journal of Computing & Security, 2015, v. 2, n. 1, p. 3
- By:
- Publication type:
- Article
Practical Differential Fault Analysis on SKINNY.
- Published in:
- ISeCure, 2022, v. 14, n. 3, p. 9
- By:
- Publication type:
- Article
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher.
- Published in:
- ISeCure, 2022, v. 14, n. 3, p. 21
- By:
- Publication type:
- Article
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking.
- Published in:
- ISeCure, 2020, v. 12, n. 2, p. 67
- By:
- Publication type:
- Article
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants.
- Published in:
- ISeCure, 2020, v. 12, n. 1, p. 13
- By:
- Publication type:
- Article
Lightweight 4 x 4MDSMatrices for Hardware-Oriented Cryptographic Primitives.
- Published in:
- ISeCure, 2019, v. 11, n. 1, p. 1
- By:
- Publication type:
- Article
A Note on the Security of Two Improved RFID Protocols.
- Published in:
- ISeCure, 2016, v. 8, n. 2, p. 157
- By:
- Publication type:
- Article
Cryptanalysis of Some First Round CAESAR Candidates.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article
Artemia: A Family of Provably Secure Authenticated Encryption Schemes.
- Published in:
- ISeCure, 2014, v. 6, n. 2, p. 125
- By:
- Publication type:
- Article
An authenticated encryption based grouping proof protocol for RFID systems.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5581, doi. 10.1002/sec.1718
- By:
- Publication type:
- Article
Weaknesses of fingerprint-based mutual authentication protocol.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 12, p. 2124, doi. 10.1002/sec.1161
- By:
- Publication type:
- Article
Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 6, p. 945, doi. 10.1002/sec.803
- By:
- Publication type:
- Article
Strengthening the Security of EPC C-1 G-2 RFID Standard.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 2, p. 1295, doi. 10.1007/s11277-013-1078-z
- By:
- Publication type:
- Article
Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol.
- Published in:
- Neural Computing & Applications, 2014, v. 24, n. 3/4, p. 799, doi. 10.1007/s00521-012-1283-9
- By:
- Publication type:
- Article
On the Security of Two Ownership Transfer Protocols and Their Improvements.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2018, v. 15, n. 1, p. 7
- By:
- Publication type:
- Article
Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 1, p. 48, doi. 10.3390/math11010048
- By:
- Publication type:
- Article
BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 24, p. 3241, doi. 10.3390/math9243241
- By:
- Publication type:
- Article
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis.
- Published in:
- International Journal of Information Security, 2012, v. 11, n. 6, p. 419, doi. 10.1007/s10207-012-0175-4
- By:
- Publication type:
- Article
On the security of an RFID-based parking lot management system.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 15, p. n/a, doi. 10.1002/dac.3313
- By:
- Publication type:
- Article
A new anti-collision protocol based on information of collided tags in RFID systems.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 3, p. n/a, doi. 10.1002/dac.2975
- By:
- Publication type:
- Article
On the (Im)Possibility of Receiving Security Beyond 2 Using an l-Bit PRNG.
- Published in:
- Wireless Personal Communications, 2017, v. 92, n. 4, p. 1591, doi. 10.1007/s11277-016-3623-z
- By:
- Publication type:
- Article
High throughput fault‐resilient AES architecture.
- Published in:
- IET Computers & Digital Techniques (Wiley-Blackwell), 2019, v. 13, n. 4, p. 312, doi. 10.1049/iet-cdt.2018.5083
- By:
- Publication type:
- Article
Toward designing a lightweight RFID authentication protocol for constrained environments.
- Published in:
- IET Communications (Wiley-Blackwell), 2024, v. 18, n. 14, p. 846, doi. 10.1049/cmu2.12794
- By:
- Publication type:
- Article
Differential fault analysis on PRINTcipher.
- Published in:
- IET Networks (Wiley-Blackwell), 2013, v. 2, n. 1, p. 30, doi. 10.1049/iet-net.2012.0117
- By:
- Publication type:
- Article
χperbp: a cloud-based lightweight mutual authentication protocol.
- Published in:
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 4, p. 1785, doi. 10.1007/s12083-023-01467-z
- By:
- Publication type:
- Article
The Rise of Passive RFID RTLS Solutions in Industry 5.0.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 5, p. 1711, doi. 10.3390/s24051711
- By:
- Publication type:
- Article