Showing 1 - 10 results of 10 for search 'based authentication protocol', query time: 0.04s Refine Results
  1. 1

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …”
  2. 2

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…This research focus on the security of the communication path between drone and ground station and solving the noted vulnerabilities like stolen-verifier, privileged-insider attacks, and outdated-data-transmission/design flaws often reported in the current authentication protocols for IoD. We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  3. 3
  4. 4

    Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure by Shaik Mullapathi Farooq (16869909)

    Published 2020
    “…A key agreement protocol based on ID-based authentication mechanism is proposed and analyzed for computational performance. …”
  5. 5
  6. 6

    A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation by Usman Khalil (7820876)

    Published 2024
    “…Since non-fungibility provided by the ERC721 standard for the cyber-physical systems (CPSs) components such as the admin, user, and IoT-enabled smart device/s in literature is explicitly missing, the proposed DSCoT devised the functionality of identification and authentication of the assets. The proposed identification and authentication mechanism in cyber-physical systems (CPSs) employs smart contracts to generate an authentication access code based on extended non-fungible tokens (NFTs), which are used to authorize access to the corresponding assets. …”
  7. 7
  8. 8

    A hybrid cryptosystem based on WEP for 802.11 networks by Haraty, Ramzi A.

    Published 2006
    “…It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). …”
    Get full text
    Get full text
    Get full text
    article
  9. 9

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10

    Critical Analysis of International STEM Education Policy Themes by Al Quraan, Dr. Elaine J.

    Published 2019
    “…The structural implementation global themes include: “subject integration/project-based learning/design-based education, non-traditional assessment, STEM content, time, professional development, and outside support (e.g., businesses and industry). …”
    Get full text
    Get full text