LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things
With the widespread popularity of mobile terminals in the Internet of Things (IoT), the
demand for cross-domain access of mobile terminals between different regions has also …
demand for cross-domain access of mobile terminals between different regions has also …
[PDF][PDF] Secure remote user authentication scheme on health care, IoT and cloud applications: a multilayer systematic survey
Secure remote user authentication is an authentication technique in which the remote server
authorizes the identity of the user through an insecure communication network. Since then …
authorizes the identity of the user through an insecure communication network. Since then …
Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks
Designing a secure and efficient authentication protocol is crucial and challenging in the
mobility network. Due to the seamless roaming of mobile users over multiple foreign agents …
mobility network. Due to the seamless roaming of mobile users over multiple foreign agents …
[HTML][HTML] Revisiting three anonymous two-factor authentication schemes for roaming service in global mobility networks
S Qiu, D Wang - Journal of Surveillance, Security and Safety, 2021 - oaepublish.com
Designing a secure and efficient anonymous authentication protocol for roaming services in
global mobile networks is a hot topic in the field of information security protocols. Based on …
global mobile networks is a hot topic in the field of information security protocols. Based on …
[PDF][PDF] AuthPFS: A method to verify perfect forward secrecy in authentication protocols
Perfect forward secrecy (PFS) is a property of authentication protocols by which the
exposure of long-term key material that is used in the protocol to authenticate and negotiate …
exposure of long-term key material that is used in the protocol to authenticate and negotiate …
A novel and quantum-resistant handover authentication protocol in IoT environment
S Zhang, X Du, X Liu - Wireless Networks, 2023 - Springer
Handover authentication and key agreement protocol is extremely essential to ensure the
security of the Internet of Things (IoT), and it enables mobile devices to access roaming …
security of the Internet of Things (IoT), and it enables mobile devices to access roaming …
An anonymity-preserving mobile user authentication protocol for global roaming services
In this article, we put forward an anonymity-preserving mobile user authentication protocol
for global roaming services. It deals with Mutual Authentication and Key Agreement (MAKA) …
for global roaming services. It deals with Mutual Authentication and Key Agreement (MAKA) …
SMASG: Secure mobile authentication scheme for global mobility network
The rapid growth of the Internet of Things (IoT) has enabled prompt services over mobile
devices. The Global Mobility Network (GLOMONET) is an important global network that …
devices. The Global Mobility Network (GLOMONET) is an important global network that …
A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network
Vehicular ad hoc network (VANET) has become an indispensable requirement in smart
cities. The major applications are acquiring traffic information, vehicular surveillance …
cities. The major applications are acquiring traffic information, vehicular surveillance …
A novel Blockchain-based authentication scheme for telecare medical information system
Data interoperability in health-care is a problem that has yet to be solved. The key question
is how to accomplish data confidentiality, data integrity, user anonymity, drug traceability …
is how to accomplish data confidentiality, data integrity, user anonymity, drug traceability …