… authentication in IoT. In section 3 we present a survey of articles on AnonymousAuthentication … In section 4 we present some of prominent security attacks on authenticationprotocols. In …
… anonymous RFID authenticationprotocols and … Anonymous RFID authetication protocols In this section we propose three RFID authenticationprotocols, a 2-pass authenticationprotocol …
YC Chen, SC Chuang, LY Yeh… - … and Mobile Computing, 2011 - Wiley Online Library
… The use of anonymous channel tickets was proposed for authentication in wireless … Recently, Yang et al. proposed a secure and efficient authenticationprotocol for anonymous channel …
P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
… have been made for designing authentication schemes with user … anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authenticationprotocol …
S Son, Y Park, Y Park - Sustainability, 2021 - mdpi.com
… Therefore, we propose an improved authenticationprotocol that can resolve these issues. … , and anonymousauthenticationprotocol suitable for IoT environments. The proposed protocol …
ME Hoque, F Rahman… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
… a group based anonymous private authenticationprotocol (AnonPri… Our protocol provides unlinkability and thereby preserves … the protocols, AnonPri and the group based authentication. …
… authenticationprotocol for IoT and claimed that their protocol is secure against all known attacks. We analyze their protocol … Then, we propose a two-factor authenticationprotocol that is …
H Xiong, Z Guan, J Hu, Z Chen - Applied Cryptography and …, 2012 - books.google.com
… anonymousauthentication mechanisms. Even though some sections might point out vulnerabilities in certain classes of authenticationprotocols… privacy-preserving protocols for …
X Zeng, G Xu, X Zheng, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
… services, malicious attackers can access them in an unauthorized way. In this paper, we designed an Efficient Anonymous User Authentication (E-AUA) protocol between the users and …