Cryptanalysis of IoT-Based Authentication Protocol Scheme

N Doshi - … Techniques and Renewable Energy: Proceedings of …, 2021 - Springer
Internet of things (IoT) is a technology in which resource constrained devices are placed in
efficient manner for communication and do the assigned task. Indeed, due to nature of …

Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard

D Kang, J Jung, H Yang, Y Choi, D Won - … , July 17− 21, 2017, The Westin …, 2018 - Springer
The mobile device market has grown rapidly, and as the internet becomes available
wireless, it offers a variety of services to people such as browsing, file sharing, shopping …

Relationship anonymity evaluation model based on Markov chain

P Zhao, S Yang, Z Chen - 2021 4th International Conference on …, 2021 - ieeexplore.ieee.org
In this paper, we propose a relational anonymous P2P communication network evaluation
model based on Markov chain (AEMC), and show how to extend our model to the …

[引用][C] Markov chain 기반익명성을갖는사용자인증방식의보안취약점분석및대응방안

유성진, 박기성, 박영호 - 한국통신학회학술대회논문집, 2018 - dbpia.co.kr
요 약 2016 년 Kang 등은 공개 채널에서 안전한 서비스를 제공하기 위하여 Markov chain 기반
사용자 인증 방식을 제안하였다. 본 논문에서는 Kang 등이제안한 사용자 인증 방식의 안전성을 …