A lightweight anonymous user authentication and key establishment scheme for wearable devices

A Gupta, M Tripathi, TJ Shaikh, A Sharma - Computer Networks, 2019 - Elsevier
The paradigm of the Internet of Things (IoT) is a system of interconnected objects that can be
accessed globally with the help of the Internet. IoT has numerous applications including …

[PDF][PDF] A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access.

X Jiang, M Liu, C Yang, Y Liu… - Computers, Materials & …, 2019 - cdn.techscience.cn
In order to deploy a secure WLAN mesh network, authentication of both users and APs is
needed, and a secure authentication mechanism should be employed. However, some …

SmartCrowd: Decentralized and automated incentives for distributed IoT system detection

B Wu, K Xu, Q Li, Z Liu, YC Hu, Z Zhang… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) devices achieve the rapid development and have been widely
deployed recently. Meanwhile, inherent vulnerabilities of IoT systems (including firmware …

Parallel cryptographic hashing: Developments in the last 25 years

N Kishore, P Raina - Cryptologia, 2019 - Taylor & Francis
Parallel computing has led to fundamental changes in almost all research areas associated
with computer science; cryptography is no exception. Besides improved speed and resource …

Efficient collision attack frameworks for RIPEMD-160

F Liu, C Dobraunig, F Mendel, T Isobe, G Wang… - Annual International …, 2019 - Springer
Abstract RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin
address with SHA-256. Due to the complex dual-stream structure, the first collision attack on …

Constructions and attacks on hash functions

Z Al-Odat, S Khan - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
This paper presents a study about the construction models that are used to build hash
functions. The study covers Merkle-Damgård, Sponge, HAIFA, Wide-Pipe, and Parallel-Tree …

基于区块链和人脸识别的双因子身份认证模型

吕婧淑, 操晓春, 杨培 - 应用科学学报, 2019 - jas.shu.edu.cn
区块链的核心特征就是去中心化和非实名化, 因此区块链技术很适合应用于身份认证的场景.
首先, 阐述了身份认证和区块链的发展历史和原理; 其次, 指出了传统身份认证机制中由于中心化 …

Building a secure infrastructure for IoT systems in distributed environments

X Zhu - 2019 - theses.hal.science
The premise of the Internet of Things (IoT) is to interconnect not only sensors, mobile
devices, and computers but also individuals, homes, smart buildings, and cities, as well as …

A blockchain based secure e-commerce transaction system

Y Zhang, X Li, J Fan, T Nie, G Yu - Web Information Systems and …, 2019 - Springer
Traditional centralized e-commerce transaction systems have security problems such as
untrustworthy third-party services, high cost of keeping funds, easy leakage of users' privacy …

Handling privacy and concurrency in an online educational evaluation system

V Liagkou, C Stylios, A Petunin - 2019 - elar.urfu.ru
Nowadays, all academic institutions exhibit and distribute their material over Internet.
Moreover, e-learning and e-evaluation products is one of the most rapidly expanding areas …