Designing secure PUF-based authentication protocols for constrained environments
Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic
authentication and key-agreement protocols due to their unique physical properties. This …
authentication and key-agreement protocols due to their unique physical properties. This …
Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks
Abstract Wireless Mesh Network (WMN) has become the most favorable choice among
various networking options due to its distributed nature. It offers continuous Internet services …
various networking options due to its distributed nature. It offers continuous Internet services …
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS.
Abstract The Internet of Things (IoT) is an innovation in technology. Continuous
advancements based on the IoT cloud have revolutionized the lives of humans, and remote …
advancements based on the IoT cloud have revolutionized the lives of humans, and remote …
[PDF][PDF] ISeCure
F Pirmoradian, SM Dakhilalian, M Safkhani - 2024 - academia.edu
ABSTRACT The Internet of Things (IoT) is an innovation in technology. Continuous
advancements based on the IoT cloud have revolutionized the lives of humans, and remote …
advancements based on the IoT cloud have revolutionized the lives of humans, and remote …
Investigation of Authentication Schemes in Telecare Medicine Information Systems
Background: Technological advancements based on the Internet of Things have
revolutionized human life, and remote monitoring of patient health is no exception. Telecare …
revolutionized human life, and remote monitoring of patient health is no exception. Telecare …