نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :International journal of Network Security & Its Applications 2010

Journal: :Journal of the Korea Institute of Information and Communication Engineering 2015

Journal: :ITM web of conferences 2023

Wireless sensor networks (WSNs) are widely used in day to activities order provide users with multiple services such as smart grids, homes, industrial internet of things (IoT), agriculture and health-care. These provided by collecting transmitting the sensing data gateway node over an unsafe channel, having constraints security, energy consumption connectivity. In 2022, Fariss et al. proposed E...

Journal: :IEEE Access 2021

Drone technology is developing very rapidly. Flying devices accomplishing various applications are becoming an integral part of our daily life undoubtedly. Drones characterized by extreme mobility, decent computing power, scalability, and a short lifetime due to energy constraints. The rise drones inevitably enabled swarms drone networking applications. networks path-breaking subclass flying ad...

2009
Nguyen Ngoc Hoa Dang Thu Hien Tran Thuy Trang

This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle a...

2006
Sangshin Lee Hyunrok Lee Tomoyuki Asano Kwangjo Kim

Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...

Journal: :International Journal of Distributed and Parallel systems 2011

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2009

Journal: :Mathematics 2023

The Internet of Things (IoT) consists a range devices that communicate with other are surrounding them. Secure communications between IoT have been an essential requirement. However, most existing authentication protocols fail to provide privacy protection for such sensitive information including device owner’s identity and type can be leaked. In this paper, based on attribute-based encryption ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید