-
1
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …”
-
2
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…This research focus on the security of the communication path between drone and ground station and solving the noted vulnerabilities like stolen-verifier, privileged-insider attacks, and outdated-data-transmission/design flaws often reported in the current authentication protocols for IoD. We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
3
-
4
Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure
Published 2020“…A key agreement protocol based on ID-based authentication mechanism is proposed and analyzed for computational performance. …”
-
5
Formal Verification of a Security Protocol in Vehicular Communication
Published 2025Get full text
doctoralThesis -
6
A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation
Published 2024“…Since non-fungibility provided by the ERC721 standard for the cyber-physical systems (CPSs) components such as the admin, user, and IoT-enabled smart device/s in literature is explicitly missing, the proposed DSCoT devised the functionality of identification and authentication of the assets. The proposed identification and authentication mechanism in cyber-physical systems (CPSs) employs smart contracts to generate an authentication access code based on extended non-fungible tokens (NFTs), which are used to authorize access to the corresponding assets. …”
-
7
-
8
A hybrid cryptosystem based on WEP for 802.11 networks
Published 2006“…It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). …”
Get full text
Get full text
Get full text
article -
9
Improving the security of SNMP in wireless networks
Published 2017“…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
Critical Analysis of International STEM Education Policy Themes
Published 2019“…The structural implementation global themes include: “subject integration/project-based learning/design-based education, non-traditional assessment, STEM content, time, professional development, and outside support (e.g., businesses and industry). …”
Get full text
Get full text