A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Authentication for 5G Mobile Wireless Networks
2022
Journal of Engineering Technology and Applied Physics
This paper surveys the state of 5G mobile wireless networks in terms of authentication. ...
It further discusses the security features and challenges in the 5G mobile wireless networks, and future directions will also be charted. ...
In a research study aligned with the concept of multi-server architecture, He et al. proposed a protocol to authenticate user with the presence of a self-certified public key cryptography [23] . ...
doi:10.33093/jetap.2022.4.1.3
fatcat:nqtl26ehq5flplq72czv4boy5q
Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey
2021
Acta Polytechnica Hungarica
, and Multi-server applications. ...
Although intensive efforts were made in designing remote user authentication scheme for health care, IoT, Multi-server and cloud applications, the majority of these applications suffers either from security ...
They developed this scheme for 5G multi-server networks and uses ECC for self-certified public-key cryptography. ...
doi:10.12700/aph.18.3.2021.3.5
fatcat:z6m33sofgngg3e4xr2zwfxm5ta
Self-organized key management with trusted certificate exchange in MANET
2015
Ain Shams Engineering Journal
The proposed architecture consists of one coordinator node, servers and normal mobile nodes. The coordinator acts as a mediator for transmitting the message among the servers and mobile nodes. ...
Each node generates its own public/private key pairs using server-signed public keying technique. ...
[9] have proposed a robust and efficient key exchange protocol for node authentication in a MANET based on multi-path communication. ...
doi:10.1016/j.asej.2014.09.011
fatcat:zj2ceqknvvhdldkvmzhz4yuuve
Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
[chapter]
2012
Applied Cryptography and Network Security
Authentication using identity-based cryptography Identity-based cryptography (IBC) is a public key cryptography in which public key of a user is derived from some publicly available unique identity information ...
The OR acts as a proxy to the mobile user and constructs an onion route consisting of other ORs using the public keys of the routers. ...
Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks, Applied Cryptography and Network Security, Dr. ...
doi:10.5772/39176
fatcat:lvh54ipvizdo3drqtro2qbhece
An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments
2018
PLoS ONE
OPEN ACCESS Citation: Li S, Wu X, Zhao D, Li A, Tian Z, Yang X (2018) An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments. ...
To compensate for these shortcomings, we propose a novel dynamic IDbased remote user authentication scheme for multi-server environments based on pairing and self-certified public keys. ...
Simultaneously, Liao and Hsiao proposed a novel non-RC-dependent multi-server remote user authentication scheme using self-certified public keys for mobile clients [27] . Recently, Chou et al. ...
doi:10.1371/journal.pone.0202657
fatcat:2pywnxh26fgntl772b4uc6cgeq
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
[article]
2019
arXiv
pre-print
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. ...
In addition, we provide a taxonomy and comparison of authentication schemes for smart mobile devices in the form of tables. Finally, we identify open challenges and future research directions. ...
cryptosystem, self-certified public keys, certificateless signature, and homomorphic encryption. ...
arXiv:1803.10281v2
fatcat:yjkohnh3qje3zk2yzp5xoakzfi
A Blockchain-Based Privacy-Awareness Authentication Scheme with Efficient Revocation for Multi-Server Architectures
2019
IEEE Access
Over the past two decades, a series of multi-server authentication schemes without communication with the online registration center in each authentication phase using the self-certified public key cryptography ...
In this work, we apply the idea of blockchain technology to construct a privacy-awareness authentication scheme for the multi-server environment, which can achieve distributed registry and efficient revocation ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the Associate Editor for providing constructive and generous feedback. ...
doi:10.1109/access.2019.2939368
fatcat:c55rpt73jzg5fjxprkjujes7uq
Table of contents
2016
IEEE Transactions on Information Forensics and Security
Zhou 1940 Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures .................................................... ...
Libraries are permitted to photocopy for private use of patrons, provided the
per-copy fee of $31.00 is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. ...
doi:10.1109/tifs.2016.2579579
fatcat:rkc5uiczczhbfhbpihcj7xxpmy
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy. ...
The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. ...
The main idea of [74] is the use of Self-Certified Public-Key, which need not be accompanied by a separate digital certificate. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
[article]
2013
arXiv
pre-print
s multi-server authentication scheme which is based on pairing and self-certified public keys, and propose a novel dynamic ID based remote user authentication scheme for multi-server environments. ...
s multi-server authentication scheme and proposed a novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. ...
At the same time, Liao and Hsiao proposed a novel non-RC dependented multi-server remote user authentication scheme using self-certified public keys for mobile clients [27] . Recently, Chou et al. ...
arXiv:1305.6350v1
fatcat:mrchtkxbrrc43k5wpkgjzzy6aq
Key Management for Beyond 5G Mobile Small Cells: A Survey
2019
Zenodo
Therefore, this paper surveys the state-of-the-art key management schemes proposed for similar network architectures (e.g., mobile ad hoc networks and ad hoc device-to-device networks) that decentralize ...
Furthermore, these key management schemes are evaluated for adaptability in a network of mobile small cells. ...
The use of self-certifying keys [116] was proposed in [117] since these require nodes to contact servers only once. ...
doi:10.5281/zenodo.4424737
fatcat:uzik7hfuj5db5k7sabfdi62xee
Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment
2022
Computers Materials & Continua
The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. ...
Authentication (MFA) using authentication credentials and biometric identity. ...
Table 2: Algorithm for registration and key agreement using elliptical curve cryptography
Algorithm for registration and key agreement using elliptical curve cryptography 1) The AS i with its identity ...
doi:10.32604/cmc.2022.019591
fatcat:4id5fkw6h5fs7c7gk4eqnx54dm
DiscoverFriends: Secure Social Network Communication in Mobile Ad Hoc Networks
[article]
2016
arXiv
pre-print
DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized public-key management scheme to securely identify friends and provide authentication. ...
Finally, to the best of our knowledge, DiscoverFriends implements and evaluates the first Android multi-hop WiFi direct protocol using IPv6. ...
As for asymmetric cryptography, a public/private key pair is generated using a RSA algorithm, in which key sizes are 1024 bits. ...
arXiv:1505.07487v2
fatcat:qm3kmeavxzd7tezusx7cxbvpa4
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
2012
IEEE Communications Surveys and Tutorials
It also discusses future directions and open problems of general Identity-Based Cryptography and its application in mobile ad hoc networks. ...
In this survey, we review all papers that are available in the literature on security schemes on mobile ad hoc networks using Identity-Based Cryptography during years 2001 to 2007. ...
They suggest the of use MAC address as node identity. The lightweight IDAKE protocol provides secure and efficient authentication and key exchange for two network nodes. ...
doi:10.1109/surv.2011.020211.00045
fatcat:bcgqnhfzxrdvlfoq6tmucsjdea
Security and Privacy Issues in Wireless Mesh Networks: A Survey
[article]
2013
arXiv
pre-print
Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. ...
Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication ...
A security analysis of the protocol has shown that the protocol ensures: (i) user anonymity, (ii) anonymous authentication of a user with an authentication server (AS) and also anonymous authentication ...
arXiv:1302.0939v1
fatcat:4bxooy2dubeopa3qbcyg5yvi3y
« Previous
Showing results 1 — 15 out of 615 results