Public key versus symmetric key cryptography in client–server authentication protocols
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Public key versus symmetric key cryptography in client–server authentication protocols
Authors
Keywords
-
Journal
International Journal of Information Security
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2021-03-08
DOI
10.1007/s10207-021-00543-w
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
- (2020) Evangelina Lara et al. SENSORS
- Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
- (2020) An Braeken SENSORS
- Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
- (2020) Inam ul haq et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
- (2019) Muhammad Naeem et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
- (2019) Bidi Ying et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
- (2019) Ashish Tomar et al. WIRELESS PERSONAL COMMUNICATIONS
- An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
- (2019) K. Sowjanya et al. International Journal of Information Security
- New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications
- (2019) Fatma Merabet et al. Peer-to-Peer Networking and Applications
- Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
- (2019) Khwaja Mansoor et al. SENSORS
- A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
- (2018) Rifaqat Ali et al. Future Generation Computer Systems-The International Journal of eScience
- An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid
- (2018) Dariush Abbasinezhad-Mood et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
- (2018) Sandip Roy et al. IEEE Transactions on Industrial Informatics
- Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
- (2018) Jian Shen et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Anonymity preserving and Lightweight Multi-Medical Server Authentication Protocol for Telecare Medical Information System
- (2018) Ruhul Amin et al. IEEE Journal of Biomedical and Health Informatics
- Efficient and Provably Secure Key Agreement for Modern Smart Metering Communications
- (2018) An Braeken et al. Energies
- Anonymous Authentication for Wireless Body Area Networks With Provable Security
- (2017) Debiao He et al. IEEE Systems Journal
- Anonymous Secure Framework in Connected Smart Home Environments
- (2017) Pardeep Kumar et al. IEEE Transactions on Information Forensics and Security
- Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
- (2017) Qi Xie et al. IEEE Transactions on Information Forensics and Security
- A lightweight password-based authentication protocol using smart card
- (2017) Chenyu Wang et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
- (2017) Saru Kumari et al. JOURNAL OF SUPERCOMPUTING
- An efficient and secure RFID authentication protocol using elliptic curve cryptography
- (2017) Negin Dinarvand et al. WIRELESS NETWORKS
- Notes on “Secure authentication scheme for IoT and cloud servers”
- (2017) Chin-Chen Chang et al. Pervasive and Mobile Computing
- A secure authentication scheme for Internet of Things
- (2017) King-Hang Wang et al. Pervasive and Mobile Computing
- A robust ElGamal-based password-authentication protocol using smart card for client-server communication
- (2016) Tanmoy Maitra et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
- (2016) Aakanksha Tewari et al. JOURNAL OF SUPERCOMPUTING
- An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
- (2016) Shehzad Ashraf Chaudhry et al. WIRELESS PERSONAL COMMUNICATIONS
- Robust Biometrics-Based Authentication Scheme for Multiserver Environment
- (2015) Debiao He et al. IEEE Systems Journal
- A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
- (2015) Vanga Odelu et al. IEEE Transactions on Information Forensics and Security
- Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
- (2015) Ding Wang et al. INFORMATION SCIENCES
- A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
- (2015) Chunhua Jin et al. JOURNAL OF MEDICAL SYSTEMS
- An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
- (2015) Baojun Huang et al. WIRELESS PERSONAL COMMUNICATIONS
- A new and secure authentication scheme for wireless sensor networks with formal proof
- (2015) Fan Wu et al. Peer-to-Peer Networking and Applications
- Secure authentication scheme for IoT and cloud servers
- (2015) Sheetal Kalra et al. Pervasive and Mobile Computing
- An improved remote user authentication scheme with key agreement
- (2014) Saru Kumari et al. COMPUTERS & ELECTRICAL ENGINEERING
- Design and analysis of an improved smartcard-based remote user password authentication scheme
- (2014) SK Hafizul Islam INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
- (2014) Zhenguo Zhao JOURNAL OF MEDICAL SYSTEMS
- An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
- (2014) Wen-Bin Hsieh et al. JOURNAL OF SUPERCOMPUTING
- Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system
- (2014) Fahad T. Bin Muhaya Security and Communication Networks
- Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture
- (2014) Jianghong Wei et al. WIRELESS PERSONAL COMMUNICATIONS
- Improvement of robust smart-card-based password authentication scheme
- (2013) Qi Jiang et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Robust Smart Card Authentication Scheme for Multi-server Architecture
- (2013) Ravi Singh Pippal et al. WIRELESS PERSONAL COMMUNICATIONS
- Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
- (2012) Debiao He et al. WIRELESS PERSONAL COMMUNICATIONS
- A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme
- (2012) Bin Wang et al. WIRELESS PERSONAL COMMUNICATIONS
- A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
- (2011) SK Hafizul Islam et al. JOURNAL OF SYSTEMS AND SOFTWARE
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search