نتایج جستجو برای: mutual authentication
تعداد نتایج: 76549 فیلتر نتایج به سال:
Wireless sensor networks (WSNs) are widely used in day to activities order provide users with multiple services such as smart grids, homes, industrial internet of things (IoT), agriculture and health-care. These provided by collecting transmitting the sensing data gateway node over an unsafe channel, having constraints security, energy consumption connectivity. In 2022, Fariss et al. proposed E...
Drone technology is developing very rapidly. Flying devices accomplishing various applications are becoming an integral part of our daily life undoubtedly. Drones characterized by extreme mobility, decent computing power, scalability, and a short lifetime due to energy constraints. The rise drones inevitably enabled swarms drone networking applications. networks path-breaking subclass flying ad...
This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle a...
Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...
The Internet of Things (IoT) consists a range devices that communicate with other are surrounding them. Secure communications between IoT have been an essential requirement. However, most existing authentication protocols fail to provide privacy protection for such sensitive information including device owner’s identity and type can be leaked. In this paper, based on attribute-based encryption ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید