An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …
securing the communication channels of connected Internet of Things (IoT) devices …
Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
A formal security analysis of the signal messaging protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
The TAMARIN prover for the symbolic analysis of security protocols
The Tamarin prover supports the automated, unbounded, symbolic analysis of security
protocols. It features expressive languages for specifying protocols, adversary models, and …
protocols. It features expressive languages for specifying protocols, adversary models, and …
Block design-based key agreement for group data sharing in cloud computing
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …
which improves the efficiency of work in cooperative environments and has widespread …
A comprehensive symbolic analysis of TLS 1.3
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …
A secure authenticated and key exchange scheme for fog computing
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …
Amassing the security: An ECC-based authentication scheme for Internet of drones
The continuous innovation and progression in hardware, software and communication
technologies helped the expansion and accelerated growth in Internet of Things based …
technologies helped the expansion and accelerated growth in Internet of Things based …
[LIVRE][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
On post-compromise security
In this work we study communication with a party whose secrets have already been
compromised. At first sight, it may seem impossible to provide any type of security in this …
compromised. At first sight, it may seem impossible to provide any type of security in this …