An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2024 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020 - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

Block design-based key agreement for group data sharing in cloud computing

J Shen, T Zhou, D He, Y Zhang, X Sun… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …

The TAMARIN prover for the symbolic analysis of security protocols

S Meier, B Schmidt, C Cremers, D Basin - Computer Aided Verification …, 2013 - Springer
The Tamarin prover supports the automated, unbounded, symbolic analysis of security
protocols. It features expressive languages for specifying protocols, adversary models, and …

A comprehensive symbolic analysis of TLS 1.3

C Cremers, M Horvat, J Hoyland, S Scott… - Proceedings of the …, 2017 - dl.acm.org
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …

A secure authenticated and key exchange scheme for fog computing

CM Chen, Y Huang, KH Wang, S Kumari… - Enterprise Information …, 2021 - Taylor & Francis
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …

Amassing the security: An ECC-based authentication scheme for Internet of drones

S Hussain, SA Chaudhry, OA Alomari… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The continuous innovation and progression in hardware, software and communication
technologies helped the expansion and accelerated growth in Internet of Things based …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

On post-compromise security

K Cohn-Gordon, C Cremers… - 2016 IEEE 29th Computer …, 2016 - ieeexplore.ieee.org
In this work we study communication with a party whose secrets have already been
compromised. At first sight, it may seem impossible to provide any type of security in this …