Loading…
Secret-Key Agreement With Public Discussion Subject to an Amplitude Constraint
Zorgui, Marwen, Rezki, Zouheir, Alomair, Basel, Alouini, Mohamed-Slim
Published in IEEE communications letters (01.06.2016)
Published in IEEE communications letters (01.06.2016)
Get full text
Journal Article
Loading…
Loading…
Loading…
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network
Jiang, Qi, Chen, Zhiren, Ma, Jianfeng, Ma, Xindi, Shen, Jian, Wu, Dapeng
Published in IEEE transactions on emerging topics in computing (01.04.2021)
Published in IEEE transactions on emerging topics in computing (01.04.2021)
Get full text
Journal Article
Loading…
Simulatable certificateless two-party authenticated key agreement protocol
Zhang, Lei, Zhang, Futai, Wu, Qianhong, Domingo-Ferrer, Josep
Published in Information sciences (15.03.2010)
Published in Information sciences (15.03.2010)
Get full text
Journal Article
Loading…
Efficient and provably secure privacy-preserving two-factor authentication and key-agreement using blockchain and TEE for IoV environments
Hou, Qihang, Hsu, Chingfang, Au, Man Ho, Hu, Honglang, Zhao, Zhuo, Wu, Zeyu
Published in Journal of systems architecture (01.07.2025)
Published in Journal of systems architecture (01.07.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things
Li, Jiliang, Su, Zhou, Guo, Deke, Choo, Kim-Kwang Raymond, Ji, Yusheng
Published in IEEE internet of things journal (01.09.2021)
Published in IEEE internet of things journal (01.09.2021)
Get full text
Journal Article
Loading…
Continuous Group Key Agreement with Active Security
Alwen, Joël, Coretti, Sandro, Jost, Daniel, Mularczyk, Marta
Published in Theory of Cryptography (2020)
Published in Theory of Cryptography (2020)
Get full text
Book Chapter
Loading…
Loading…
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
Wu, Tsu-Yang, Yang, Lei, Luo, Jia-Ning, Ming-Tai Wu, Jimmy
Published in Security and communication networks (28.09.2021)
Published in Security and communication networks (28.09.2021)
Get full text
Journal Article
Loading…
Loading…
EKG-based key agreement in Body Sensor Networks
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.
Published in 2008 IEEE INFOCOM Workshops (01.04.2008)
Published in 2008 IEEE INFOCOM Workshops (01.04.2008)
Get full text
Conference Proceeding
Loading…
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
Ali, Zeeshan, Chaudhry, Shehzad Ashraf, Ramzan, Muhammad Sher, Al-Turjman, Fadi
Published in IEEE access (01.01.2020)
Published in IEEE access (01.01.2020)
Get full text
Journal Article
Loading…
Loading…
Efficient three-party authenticated key agreement protocol in certificateless cryptography
Xiong, Hu, Chen, Zhong, Qin, Zhiguang
Published in International journal of computer mathematics (01.09.2011)
Published in International journal of computer mathematics (01.09.2011)
Get full text
Journal Article
Loading…
Synchronization of Tree Parity Machines Using Nonbinary Input Vectors
Stypiski, Milosz, Niemiec, Marcin
Published in IEEE transaction on neural networks and learning systems (01.01.2024)
Published in IEEE transaction on neural networks and learning systems (01.01.2024)
Get full text
Journal Article
Loading…
IoT Authentication Protocols: Challenges, and Comparative Analysis
Alsheavi, Amar N., Hawbani, Ammar, Othman, Wajdy, Wang, Xingfu, Qaid, Gamil, Zhao, Liang, Al-Dubai, Ahmed, Zhi, Liu, Ismail, A.s., Jhaveri, Rutvij, Alsamhi, Saeed, Al-Qaness, Mohammed A. A.
Published in ACM computing surveys (09.01.2025)
Published in ACM computing surveys (09.01.2025)
Get full text
Journal Article