L Li, X Zhao, G Xue - Proceedings of the 7th ACM Symposium on …, 2012 - dl.acm.org
… from their friends before authentication takes place, … new authenticated key exchange protocol based on the exclusive secrets shared between friends. It provides identity authentication …
… Rather, we propose an overall authenticationprotocol framework that intends to resist or defend a possible DDoS attack. Following any standard authenticationprotocol, our proposed …
SA Shah, C Gongliang, L Jianhua, Y Glani - … Intelligence, Networking and …, 2020 - Springer
… privacy-preserving authenticationprotocol in VANET using the socialnetwork. We propose … using the socialnetwork. The master vehicle helps to load balance the socialnetwork server …
R Yu, J Wang, T Xu, J Gao, Y An, G Zhang, M Yu - IEEE Access, 2017 - ieeexplore.ieee.org
… However, as socialnetworks have become more and more … , in user centric socialnetworks, we detect social communities … Socialnetwork applications reflect real world to cyberspace, …
J Zhan, X Fang - … and Knowledge Management: First International Joint …, 2011 - Springer
… , and names of subjects are proofs for social relationships. Eligible users of socialauthentication protocols should be capable to possess them. For the authenticationprotocols in [1, 7], …
… proposed a novel 3PAKE protocol for the security verification of socialnetworks, which is … the modern socialnetwork environment against diverse assaults. This protocol was developed …
K Sagar, V Waghmare - Procedia Computer Science, 2016 - Elsevier
… A trust model which is implemented in socialnetworking sites is associated with an authentication protocol. Trust evaluation models are really needed in smart environments is that they …
SS Ninawe, P Venkataram - International Journal of Social …, 2019 - inderscienceonline.com
… of socialnetworksauthentication schemes is shown. Later, various attacks and their prevention in socialnetworks … proposed protocol with Kerberos and ElGamal authenticationprotocol. …
… a brief introduction of online socialnetworks, their characteristics, evolution, and network structure. Next, I describe the privacy and security issues of online socialnetworks, which have …