The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the client-server environment …
X Zhang, B Wang, W Wang - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Along with the large-scale proliferation of network and information technology, users can obtain the information resources conveniently via intelligent device. Authentication …
Due to the infrastructure provided by the GLOobal MObility NETwork, mobile users are able to access many network services anytime and anywhere, even in a roaming environment …
It is convenient to obtain the information resources via intelligent devices over cloud systems. The user authentication mechanism is a fundamental tool for ensuring the validity …
D Xie, J Yang, W Bian, F Chen… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
In mobile edge computing, the computing tasks of IoT terminal devices with limited computing power often need to be offloaded to servers for processing. However, there are …
W Zhang, D Lin, H Zhang, C Chen… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Recently, Goutham et al. proposed an ID-based user authentication with key agreement on elliptic curve cryptography (ECC), which is suitable to be applied in client …
R Chen, D Peng - Wireless Personal Communications, 2017 - Springer
In wireless communication system, a good protocol should satisfy many requirements: user identity authentication, privacy protection, computational efficiency and resist some known …
M Xu, Q Dong, M Zhou, C Wang… - … and Mobile Computing, 2020 - Wiley Online Library
As an important application of the Internet of Things, smart home has greatly facilitated our life. Since the communication channels of smart home are insecure and the transmitted data …
RA Goutham, GJ Lee, KY Yoo - Proceedings of the 30th Annual ACM …, 2015 - dl.acm.org
In recent times, Debiao et al. proposed an ID-based user authentication with key agreement protocol on elliptic curve cryptography (ECC). Conversely, our analysis shows that their …