[PDF][PDF] High Secure Initial Authentication Protocol based on EPNR Cryptosystem for Supporting Radiation Monitoring System

N Hermawan, E Winarko, A Ashari… - International Journal of …, 2021 - researchgate.net
Radiation monitoring data is very important to support the safety of nuclear installation. The
data should be ensured generated and supplied by an authenticated sensor. The new …

[PDF][PDF] A hybrid security protocol using python

DV Kumar - Int J Comput Sci Inf Technol Res, 2014 - academia.edu
A Computer Network is an interconnected group of autonomous computing nodes, which
use a well defined, mutually agreed set of rules and conventions known as protocols …

A proposed scheme to achieve node authentication in military applications of wireless sensor network

D Suhag, SS Gaur, AK Mohapatra - Journal of Statistics and …, 2019 - Taylor & Francis
Abstract Wireless Sensor Network is one of the most rapidly evolving networks which are
being deployed in a wide variety of applications like agriculture, environment monitoring …

Computationally efficient mutual authentication protocol for remote infant incubator monitoring system

S Jegadeesan, M Dhamodaran… - Healthcare …, 2019 - Wiley Online Library
Internet of Things (IoT), cloud computing and wireless medical sensor networks have
significantly improved remote healthcare monitoring. In a healthcare monitoring system …

A signature-based mutual authentication protocol for remote health monitoring

S Binu, M Misbahuddin, J Paulose - SN Computer Science, 2020 - Springer
Remote health monitoring can offer a lot of advantage to all the players in healthcare
industry and it can contribute to reduced healthcare expenses. Wireless medical sensor …

Secure medical data transmission by using ECC with mutual authentication in WSNs

SK Shankar, AS Tomar, GK Tak - Procedia Computer Science, 2015 - Elsevier
Abstract Wireless Body Area Network (WBAN) is a part of Wireless Sensor Network (WSN)
which works with medical devices and capable to transmit medical data in run time. It has …

Mutual entity authentication protocol based on ECDSA for WSN

AH Moon, U Iqbal, GM Bhat - Procedia Computer Science, 2016 - Elsevier
Digital Signatures are primarily employed to achieve data integrity, data origin
authentication and non-repudiation. In comparison to RSA-based digital signatures, the …

Computationally efficient two–Factor authentication protocol using ECC

S Sharma, S Rana - AIP Conference Proceedings, 2023 - pubs.aip.org
The contemporary breakthrough in the field of technology have facilitated us with plethora of
technological devices such as computers and so on. With this tremendous advancement, an …

Securing wireless sensors in military applications through resilient authentication mechanism

U Jain, M Hussain - Procedia Computer Science, 2020 - Elsevier
Using wireless sensor nodes in military operations reduces risks and improves the efficiency
of operations, and above all, it minimizes causalities by a large number. Security of sensor …

[引用][C] Enhanced RSACRT for energy efficient authentication to wireless sensor networks security

P Kalyani, C Chellappan - American Journal of Applied …, 2012 - Science Publications