Designing secure PUF-based authentication protocols for constrained environments

SW Lee, M Safkhani, Q Le, OH Ahmed… - Scientific Reports, 2023 - nature.com
Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic
authentication and key-agreement protocols due to their unique physical properties. This …

Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks

AK Roy, V Varadaranjan, K Nath - Journal of Information Security and …, 2024 - Elsevier
Abstract Wireless Mesh Network (WMN) has become the most favorable choice among
various networking options due to its distributed nature. It offers continuous Internet services …

ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS.

F Pirmoradian, SM Dakhilalian, M Safkhani - ISeCure, 2024 - search.ebscohost.com
Abstract The Internet of Things (IoT) is an innovation in technology. Continuous
advancements based on the IoT cloud have revolutionized the lives of humans, and remote …

[PDF][PDF] ISeCure

F Pirmoradian, SM Dakhilalian, M Safkhani - 2024 - academia.edu
ABSTRACT The Internet of Things (IoT) is an innovation in technology. Continuous
advancements based on the IoT cloud have revolutionized the lives of humans, and remote …

Investigation of Authentication Schemes in Telecare Medicine Information Systems

SM Dakhilalian, M Safkhani, F Pirmoradian… - Journal of Isfahan …, 2024 - jims.mui.ac.ir
Background: Technological advancements based on the Internet of Things have
revolutionized human life, and remote monitoring of patient health is no exception. Telecare …