-
1
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …"
-
2
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…This research focus on the security of the communication path between drone and ground station and solving the noted vulnerabilities like stolen-verifier, privileged-insider attacks, and outdated-data-transmission/design flaws often reported in the current authentication protocols for IoD. We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
3
-
4
Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure
منشور في 2020"…A key agreement protocol based on ID-based authentication mechanism is proposed and analyzed for computational performance. …"
-
5
Formal Verification of a Security Protocol in Vehicular Communication
منشور في 2025احصل على النص الكامل
doctoralThesis -
6
A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation
منشور في 2024"…Since non-fungibility provided by the ERC721 standard for the cyber-physical systems (CPSs) components such as the admin, user, and IoT-enabled smart device/s in literature is explicitly missing, the proposed DSCoT devised the functionality of identification and authentication of the assets. The proposed identification and authentication mechanism in cyber-physical systems (CPSs) employs smart contracts to generate an authentication access code based on extended non-fungible tokens (NFTs), which are used to authorize access to the corresponding assets. …"
-
7
-
8
A hybrid cryptosystem based on WEP for 802.11 networks
منشور في 2006"…It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
9
Improving the security of SNMP in wireless networks
منشور في 2017"…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
Critical Analysis of International STEM Education Policy Themes
منشور في 2019"…The structural implementation global themes include: “subject integration/project-based learning/design-based education, non-traditional assessment, STEM content, time, professional development, and outside support (e.g., businesses and industry). …"
احصل على النص الكامل
احصل على النص الكامل