Found: 490
Select item for more details and to access through your institution.
Highly secure authentication and key agreement protocol for the internet of vehicles.
- Published in:
- Telecommunication Systems, 2024, v. 87, n. 1, p. 73, doi. 10.1007/s11235-024-01172-z
- By:
- Publication type:
- Article
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 2, p. 2359, doi. 10.1007/s11042-017-4390-x
- By:
- Publication type:
- Article
Design flaws of 'an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography'.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 11, p. 13581, doi. 10.1007/s11042-016-3771-x
- By:
- Publication type:
- Article
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 2, p. 1801, doi. 10.1007/s11042-015-3166-4
- By:
- Publication type:
- Article
Design of a password-based authenticated key exchange protocol for SIP.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 23, p. 16017, doi. 10.1007/s11042-015-2911-z
- By:
- Publication type:
- Article
Analyzing three-party authentication and key agreement protocol for real time IP multimedia server-client systems.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 10, p. 5795, doi. 10.1007/s11042-015-2542-4
- By:
- Publication type:
- Article
An image-based key agreement protocol using the morphing technique.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 9, p. 3207, doi. 10.1007/s11042-013-1780-6
- By:
- Publication type:
- Article
A cluster-based key agreement scheme using keyed hashing for Body Area Networks.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 2, p. 201, doi. 10.1007/s11042-011-0791-4
- By:
- Publication type:
- Article
Post-quantum security design for hierarchical healthcare systems based on lattices.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 12, p. 17292, doi. 10.1007/s11227-024-06143-4
- By:
- Publication type:
- Article
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 10, p. 11261, doi. 10.1007/s11227-023-05064-y
- By:
- Publication type:
- Article
A novel efficient and lightweight authentication scheme for secure smart grid communication systems.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 7360, doi. 10.1007/s11227-022-04944-z
- By:
- Publication type:
- Article
Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 4, p. 3902, doi. 10.1007/s11227-022-04807-7
- By:
- Publication type:
- Article
Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 3, p. 2882, doi. 10.1007/s11227-022-04766-z
- By:
- Publication type:
- Article
A provably secure lightweight authentication protocol in mobile edge computing environments.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 12, p. 13893, doi. 10.1007/s11227-022-04411-9
- By:
- Publication type:
- Article
Authenticated key agreement protocols for dew-assisted IoT systems.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 10, p. 12093, doi. 10.1007/s11227-022-04364-z
- By:
- Publication type:
- Article
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 10, p. 12792, doi. 10.1007/s11227-021-04280-8
- By:
- Publication type:
- Article
Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 6, p. 8708, doi. 10.1007/s11227-021-04175-8
- By:
- Publication type:
- Article
Authentication and key establishment protocol from supersingular isogeny for mobile environments.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 5, p. 6371, doi. 10.1007/s11227-021-04121-8
- By:
- Publication type:
- Article
A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 4, p. 5903, doi. 10.1007/s11227-021-04114-7
- By:
- Publication type:
- Article
An efficient authentication with key agreement procedure using Mittag–Leffler–Chebyshev summation chaotic map under the multi-server architecture.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 4, p. 4938, doi. 10.1007/s11227-021-04039-1
- By:
- Publication type:
- Article
Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 1, p. 497, doi. 10.1007/s11227-021-03857-7
- By:
- Publication type:
- Article
A secure blockchain-based group key agreement protocol for IoT.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 8, p. 9046, doi. 10.1007/s11227-020-03561-y
- By:
- Publication type:
- Article
Robust session key generation protocol for social internet of vehicles with enhanced security provision.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 3, p. 2511, doi. 10.1007/s11227-020-03363-2
- By:
- Publication type:
- Article
MDSbSP: a search protocol based on MDS codes for RFID-based Internet of vehicle.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 2, p. 1094, doi. 10.1007/s11227-020-03302-1
- By:
- Publication type:
- Article
An efficient and secure design of multi-server authenticated key agreement protocol.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 9, p. 4771, doi. 10.1007/s11227-018-2467-6
- By:
- Publication type:
- Article
Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 9, p. 4521, doi. 10.1007/s11227-018-2251-7
- By:
- Publication type:
- Article
Security analysis of a user registration approach.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 3, p. 900, doi. 10.1007/s11227-015-1619-1
- By:
- Publication type:
- Article
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol.
- Published in:
- Journal of Supercomputing, 2015, v. 71, n. 8, p. 3163, doi. 10.1007/s11227-015-1434-8
- By:
- Publication type:
- Article
SECURE AUTHENTICATION PROTOCOL FOR IOT APPLICATIONS BASED ON BLOCKCHAIN TECHNOLOGY.
- Published in:
- i-Manager's Journal on Computer Science, 2023, v. 11, n. 1, p. 12, doi. 10.26634/jcom.11.1.19380
- By:
- Publication type:
- Article
Analyzing cognitive processes of a product/service-system design session using protocol analysis.
- Published in:
- AI EDAM, 2020, v. 34, n. 4, p. 515, doi. 10.1017/S0890060420000402
- By:
- Publication type:
- Article
Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol.
- Published in:
- International Journal of Electronics & Telecommunications, 2023, v. 69, n. 1, p. 5, doi. 10.24425/ijet.2022.143902
- By:
- Publication type:
- Article
movedesign : Shiny R app to evaluate sampling design for animal movement studies.
- Published in:
- Methods in Ecology & Evolution, 2023, v. 14, n. 9, p. 2216, doi. 10.1111/2041-210X.14153
- By:
- Publication type:
- Article
Secure Registration Protocol for the Internet of Drones Using Blockchain and Physical Unclonable Function Technology.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 10, p. 1886, doi. 10.3390/sym15101886
- By:
- Publication type:
- Article
An Authentication Protocol for the Medical Internet of Things.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 7, p. N.PAG, doi. 10.3390/sym14071483
- By:
- Publication type:
- Article
A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 1, p. 46, doi. 10.3390/sym14010046
- By:
- Publication type:
- Article
Enhanced Matrix Power Function for Cryptographic Primitive Construction.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 2, p. 43, doi. 10.3390/sym10020043
- By:
- Publication type:
- Article
Toward Designing a Secure Authentication Protocol for IoT Environments.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 7, p. 5934, doi. 10.3390/su15075934
- By:
- Publication type:
- Article
Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 7, p. 5734, doi. 10.3390/su15075734
- By:
- Publication type:
- Article
Secure and Lightweight Authentication Protocol for Privacy Preserving Communications in Smart City Applications.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 6, p. 5346, doi. 10.3390/su15065346
- By:
- Publication type:
- Article
SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 17, p. 11054, doi. 10.3390/su141711054
- By:
- Publication type:
- Article
A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 1, p. 400, doi. 10.3390/su13010400
- By:
- Publication type:
- Article
Simple Yet Secure Encoder Architecture and Ultralightweight Mutual Authentication Protocol for RFID Tags in IoT.
- Published in:
- Journal of Circuits, Systems & Computers, 2023, v. 32, n. 7, p. 1, doi. 10.1142/S0218126623501189
- By:
- Publication type:
- Article
Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.
- Published in:
- PLoS ONE, 2018, v. 13, n. 10, p. 1, doi. 10.1371/journal.pone.0203984
- By:
- Publication type:
- Article
Distributed key agreement for group communications based on elliptic curves. An application to sensor networks.
- Published in:
- Mathematical Methods in the Applied Sciences, 2016, v. 39, n. 16, p. 4797, doi. 10.1002/mma.3802
- By:
- Publication type:
- Article
An Enhanced Decentralized Virtual Machine Migration Approach for Energy-Aware Cloud Data Centers.
- Published in:
- Intelligent Automation & Soft Computing, 2021, v. 27, n. 2, p. 347, doi. 10.32604/iasc.2021.012401
- By:
- Publication type:
- Article
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2023, v. 2023, n. 1, p. 1, doi. 10.1186/s13638-023-02245-4
- By:
- Publication type:
- Article
An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2021, v. 2021, n. 1, p. 1, doi. 10.1186/s13638-021-02022-1
- By:
- Publication type:
- Article
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2021, v. 2021, n. 1, p. 1, doi. 10.1186/s13638-021-02000-7
- By:
- Publication type:
- Article
Guest editorial: Smart communications and networking: architecture, applications, and future challenges.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 10, p. 1021, doi. 10.1049/cmu2.12373
- By:
- Publication type:
- Article
A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 10, p. 1142, doi. 10.1049/cmu2.12295
- By:
- Publication type:
- Article