A new mutual authentication and key agreement protocol for mobile client—server environment

LD Tsobdjou, S Pierre… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… , authentication, password change and smart card revocation. Qi and Chen [23] describe
an ECC-based authenticated key exchange protocol for mobile environments. The user's

Session Key Agreement Protocol for Secure D2D Communication

VO Nyangaresi, Z Mohammad - … on Safety and Security with IoT: SaSeIoT …, 2022 - Springer
… privacy and security challenges effectively. In this paper, a session key agreement protocol
is … Simulation results showed that the proposed protocol exhibits the lowest communication …

Trusted authority based session key agreement and authentication algorithm for smart grid networks

VO Nyangaresi, M Abd‐Elnaby… - Transactions on …, 2022 - Wiley Online Library
… On the other hand, the authentication scheme in Reference 23 … Key agreement and
authentication protocols have been presented in References 3, 24, while a key distribution protocol

SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks

J Zhang, H Zhong, J Cui, Y Xu… - … Forensics and Security, 2020 - ieeexplore.ieee.org
Session key security (SK-security) is supported even if temporary information is leaked. 2) …
-to-many authentication and key agreement scheme with an effective authentication function …

A reliable lightweight two factor mutual authenticated session key agreement protocol for multi-server environment

S Shunmuganathan - Wireless Personal Communications, 2021 - Springer
… two factor secured multi-server session key agreement scheme based on two-way authentication.
… It contains the global constant and the different session initiation. Here the intruder ‘i’ is …

A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol

M Nikooghadam, H Amintoosi - Security and privacy, 2020 - Wiley Online Library
… We propose a novel secure authentication and key agreement protocol based on ECC that
security flaws of Qui et al's scheme12 and is able to provide mutual authentication and user

A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework

A Irshad, M Usman, SA Chaudhry… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
authentication protocol for two interacting members in the following way: Definition 2: We can
formally define a two-party authenticated key agreement P by an efficient … in the scheme. X: …

An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks

MA Khan, I Ullah, N Kumar, OS Oubbati… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… , secure access control and a key agreement mechanism are required. The mechanism must
utilize the two phases, ie, node authentication and key agreement, … key agreement scheme, …

Full session key agreement scheme based on chaotic map in vehicular ad hoc networks

J Cui, Y Wang, J Zhang, Y Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
security and privacy preservation in VANETs, this paper proposes a full session key
agreement scheme … In this paper, the first phase describes the key agreement between the fog …

An efficient lightweight key agreement and authentication scheme for WBAN

ZU Rehman, S Altaf, S Iqbal - IEEE Access, 2020 - ieeexplore.ieee.org
security features provided by the proposed scheme against other cyber-attacks. Secondly,
we provide security verification of the proposed scheme … cover informal verification using the …