Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
LNSC: A security model for electric vehicle and charging pile management based on blockchain ecosystem
X Huang, C Xu, P Wang, H Liu - IEEE access, 2018 - ieeexplore.ieee.org
The Internet of Energy (IoE) provides an effective networking technology for distributed
green energy, which allows the connection of energy anywhere at any time. As an important …
green energy, which allows the connection of energy anywhere at any time. As an important …
Government regulations in cyber security: Framework, standards and recommendations
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …
software as well as data (information) from cyber attacks (adversaries). A cyber security …
Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the
components of the Internet of Things, and will become globally addressable by any entity …
components of the Internet of Things, and will become globally addressable by any entity …
Understanding node capture attacks in user authentication schemes for wireless sensor networks
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …
Design of secure and lightweight authentication protocol for wearable devices environment
Wearable devices are used in various applications to collect information including step
information, slee** cycles, workout statistics, and health-related information. Due to the …
information, slee** cycles, workout statistics, and health-related information. Due to the …
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
Abstract Industry 4.0, which combines information technology, network and industrial
production, is expected to have a tremendous impact on our daily lives. In such a complex …
production, is expected to have a tremendous impact on our daily lives. In such a complex …
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography
Internet of things (IoT) has become a new era of communication technology for performing
information exchange. With the immense increment of usage of smart devices, IoT services …
information exchange. With the immense increment of usage of smart devices, IoT services …
Secure message communication protocol among vehicles in smart city
Secure messages exchange among different vehicles is one of the most challenging tasks in
future smart cities. Any malicious activity has the potential to compromise the confidentiality …
future smart cities. Any malicious activity has the potential to compromise the confidentiality …