… They proposed a conditional privacy-preserving authenticationscheme that … security and privacy requirements for authentication that serve as a fundamental step to ensuring security in …
… The security and privacy issues must be addressed primarily … Different privacy-preserving authenticationschemes have been … schemes do not entirely solve the issues related to security …
… an authenticationscheme based on conditional privacy-… reviews the security vulnerabilities of the existing schemes. It … conditional privacy-preserving authenticationscheme to …
H Zhong, S Han, J Cui, J Zhang, Y Xu - Information Sciences, 2019 - Elsevier
… We propose a privacy-preserving authenticationscheme which achieves full aggregation in … that the scheme satisfies the security requirements in VANET through the security analysis. …
… Nevertheless, no one covered the privacy and security issues as a holistic view. In … privacy and authenticationschemes into four major groups with their security mechanisms, security …
D He, S Zeadally, B Xu, X Huang - … Forensics and Security, 2015 - ieeexplore.ieee.org
… a CPPA scheme for VANETs that does not use bilinear paring and we demonstrate that it could supports both the mutual authentication and the privacy protection simultaneously. Our …
… CONCLUSION Privacy preservation is one of the most noticeable issues in IIoT environment… a new authenticationscheme, called the privacy-preserving user authentication (BP2UA), …
I Ali, A Hassan, F Li - Vehicular Communications, 2019 - Elsevier
… In this paper, we classify authentication and privacyschemes … schemes along with their strengths and limitations, security … privacy preservation and anonymous authenticationscheme …
Q Jiang, J Ma, F Wei - IEEE systems journal, 2016 - ieeexplore.ieee.org
… provably secure authenticationscheme for mobile … scheme is equipped with a claimed proof of provable security, we have pointed out the scheme fails to achieve mutual authentication …