Search
Now showing items 1-10 of 78
Blockchain-based authentication in internet of vehicles: a survey
(Multidisciplinary Digital Publishing Institute, 2021-01)
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various ...
Implementation and practical problems of chaos-based cryptography revisited
(Elsevier, 2020-02)
Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional ...
A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design
(IEEE, 2020-08)
Key Management in Delay Tolerant Networks (DTN) still remains an unsolved complex problem. Due to peculiar characteristics of DTN, important challenges that make it difficult to design key management architecture are: 1) ...
A Key Transport Protocol for Advance Metering Infrastructure (AMI) Based on Public Key Cryptography
(IEEE, 2020)
Advance metering infrastructure (AMI) is an important element of the Smart Grid as it is expectable to simplify the transport of meter reading and control information from meters to the utility provider. Smart meters are ...
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
(ScienceDirect, 2018-04)
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of electricity generation by providing the capability to monitor the consumption behavior of customers. This advance grid system can help ...
Efficient end-to-end authentication protocol for wearable health monitoring systems
(ScienceDirect, 2017-10)
Wearable health monitoring systems (WHMSs) will play an increasingly important role in future e-healthcare and enable smart and ubiquitous healthcare services. Given its sensitivity, the health data should be protected ...
An improved and provably secure privacy preserving authentication protocol for SIP
(Springer Link, 2015-09)
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and ...
An improved smart card based authentication scheme for session initiation protocol
(Springer Link, 2015-09)
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet Protocol based communication over public channels. SIP is inherently insecure because of underlying open text architecture. A number ...
An enhanced privacy preserving remote user authentication scheme with provable security
(ResearchGate, 2015-06)
Very recently, Kumari et al. proposed a symmetric key and smart card-based remote user password authentication scheme to enhance Chung et al.’s scheme. They claimed their enhanced scheme to provide anonymity while resisting ...
Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles
(IEEE Xplore, 2020-02)
The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the ...