[HTML][HTML] Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Quantum cryptography in 5G networks: a comprehensive overview

M Mehic, L Michalek, E Dervisevic… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …

[HTML][HTML] Rgb image encryption through cellular automata, s-box and the lorenz system

W Alexan, M ElBeltagy, A Aboshousha - Symmetry, 2022 - mdpi.com
The exponential growth in transmission of multimedia over the Internet and unsecured
channels of communications is putting pressure on scientists and engineers to develop …

[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Securing vehicular ad hoc networks

M Raya, JP Hubaux - Journal of computer security, 2007 - content.iospress.com
Vehicular networks are very likely to be deployed in the coming years and thus become the
most relevant form of mobile ad hoc networks. In this paper, we address the security of these …

Security of vehicular ad-hoc networks: A comprehensive survey

AK Malhi, S Batra, HS Pannu - Computers & Security, 2020 - Elsevier
Vehicles equipped with significant computing, communication and sensing (also known as
“smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The …

HMQV: A high-performance secure Diffie-Hellman protocol

H Krawczyk - Annual international cryptology conference, 2005 - Springer
The MQV protocol of Law, Menezes, Qu, Solinas and Vanstone is possibly the most efficient
of all known authenticated Diffie-Hellman protocols that use public-key authentication. In …

A review of multi-factor authentication in the Internet of Healthcare Things

T Suleski, M Ahmed, W Yang, E Wang - Digital health, 2023 - journals.sagepub.com
Objective This review paper aims to evaluate existing solutions in healthcare authentication
and provides an insight into the technologies incorporated in Internet of Healthcare Things …

On physical-layer identification of wireless devices

B Danev, D Zanetti, S Capkun - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …