Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges

PR Babu, SAP Kumar, AG Reddy, AK Das - Computer Science Review, 2024 - Elsevier
This study provides an in-depth survey of quantum secure authentication and key
agreement protocols, investigating the dynamic landscape of cryptographic techniques …

Decentralized authentication and access control protocol for blockchain-based e-health systems

X Xiang, J Cao, W Fan - Journal of network and computer applications, 2022 - Elsevier
The Internet of things technology has accelerated the development of e-health solutions and
allows patients to obtain a more satisfying medical service experience. Each electronic …

A permissioned blockchain-based identity management and user authentication scheme for e-health systems

X Xiang, M Wang, W Fan - IEEE access, 2020 - ieeexplore.ieee.org
The growth of electronic healthcare (e-health) systems is promoted by the evolution of
Internet of Things (IoT) technology, as this new environment provides a variety of …

Authentication protocol for cloud databases using blockchain mechanism

G Deep, R Mohana, A Nayyar, P Sanjeevikumar… - Sensors, 2019 - mdpi.com
Cloud computing has made the software development process fast and flexible but on the
other hand it has contributed to increasing security attacks. Employees who manage the …

A survey of algebraic properties used in cryptographic protocols

V Cortier, S Delaune… - Journal of Computer …, 2006 - content.iospress.com
Cryptographic protocols are successfully analyzed using formal methods. However, formal
approaches usually consider the encryption schemes as black boxes and assume that an …

An NP decision procedure for protocol insecurity with XOR

Y Chevalier, R Küsters, M Rusinowitch… - Theoretical Computer …, 2005 - Elsevier
We provide a method for deciding the insecurity of cryptographic protocols in the presence
of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-called …

Intruder deductions, constraint solving and insecurity decision in presence of exclusive or

H Comon-Lundh, V Shmatikov - 18th Annual IEEE Symposium …, 2003 - ieeexplore.ieee.org
We present decidability results for the verification of cryptographic protocols in the presence
of equational theories corresponding to xor and Abelian groups. Since the perfect …

Formal models and techniques for analyzing security protocols: A tutorial

V Cortier, S Kremer - Foundations and Trends® in …, 2014 - nowpublishers.com
Security protocols are distributed programs that aim at securing communications by the
means of cryptography. They are for instance used to secure electronic payments, home …

[图书][B] Semirings for soft constraint solving and programming

S Bistarelli - 2004 - books.google.com
Constraint satisfaction and constraint programming have shown to be very simple but
powerful ideas, with applications in various areas. Still, in the last ten years, the simple …

Cryptographic protocol analysis on real C code

J Goubault-Larrecq, F Parrennes - International Workshop on Verification …, 2005 - Springer
Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs
affecting security, which cannot be detected by just analyzing abstract protocols (eg, SSL or …