… rio, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed. Firstly, the effect of completing keyagreementprotocol in advance was …
… and secure resource sharing of multi domain terminals. In order to solve these … keyagreement (GKA) protocol based on dynamic attribute permissions is proposed. In the protocol, a key …
… for multi-server based D2Dcommunication. J Inf … PUF-MAC into a keyagreementprotocol with forward/backward security, along with a bilateral authentication protocol by which its …
… An ID-based remote mutual authentication with keyagreement scheme for mobile devices on elliptic curve cryptosystem[J]. Computer & Security, 2009, 28(3/4): 138-143. …
… A review on resource allocation techniques in D2Dcommunication for 5G and B5G technology. Peer-to-Peer Networking and Applications, 2021, 14(1): 243-269. doi: 10.1007/s12083-…