Securing public safety communications on commercial and tactical 5G networks: A survey and future research directions
The forthcoming communication networks for public safety authorities rely on the fifth
generation (5G) of mobile networking technologies. Police officers, paramedics, border …
generation (5G) of mobile networking technologies. Police officers, paramedics, border …
Computation-transferable authenticated key agreement protocol for smart healthcare
Smart healthcare plays an important role in contemporary society while its security and
privacy issues remain inevitable challenges. Authenticated key agreement (AKA) …
privacy issues remain inevitable challenges. Authenticated key agreement (AKA) …
A sidechain-based decentralized authentication scheme via optimized two-way peg protocol for smart community
M Li, H Tang, AR Hussein… - IEEE Open Journal of the …, 2020 - ieeexplore.ieee.org
In this work, we propose a novel sidechain structure via an optimized two-way peg protocol
for device authentication in the smart community in order to overcome the limitations of …
for device authentication in the smart community in order to overcome the limitations of …
An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare
Y Hu, C Huang, H Cheng - Computer Communications, 2024 - Elsevier
Smart healthcare overcomes the limitations of time and space, allowing users to access
medical and health services anywhere and anytime, thus improving the quality and …
medical and health services anywhere and anytime, thus improving the quality and …
Strongly Secure Identity-based Authenticated Key Agreement Protocol with Identity Concealment for Secure Communication in 5G Network
H Lian, B Kang, L Yang - IEEE Access, 2024 - ieeexplore.ieee.org
With the rocketing progress of the fifth generation (5G) mobile communication technology,
identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly …
identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly …
Leakage-resilient authenticated key exchange for edge artificial intelligence
Edge Artificial Intelligence (AI) is a timely complement of cloud-based AI. By introducing
intelligence to the edge, it alleviates privacy concerns of streaming and storing data to the …
intelligence to the edge, it alleviates privacy concerns of streaming and storing data to the …
Identity-based identity-concealed authenticated key exchange
H Lian, T Pan, H Wang, Y Zhao - … , Darmstadt, Germany, October 4–8, 2021 …, 2021 - Springer
Identity-based authenticated key exchange (ID-AKE) allows two parties (whose identities are
just their public keys) to agree on a shared session key over open channels. At ESORICS …
just their public keys) to agree on a shared session key over open channels. At ESORICS …
Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications
H Sun, C Li, J Zhang, S Liang, W Huang - Sensors, 2023 - mdpi.com
Internet of Things (IoT) applications have been increasingly developed. Authenticated key
agreement (AKA) plays an essential role in secure communication in IoT applications …
agreement (AKA) plays an essential role in secure communication in IoT applications …
Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge
J Zhang, F Zhang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the new paradigm of blockchain-powered intelligent edge, the key agreement is a
significant problem that has not been extensively studied so far. Existing key agreement …
significant problem that has not been extensively studied so far. Existing key agreement …
Leakage-resilient and lightweight authenticated key exchange for e-health
E-Health applications generally involve human users' privacy information such as identity
and medical data. To protect these data, authenticated key exchange (AKE) protocols are …
and medical data. To protect these data, authenticated key exchange (AKE) protocols are …