Search
نمایش تعداد 1-10 از 254
A Note on Group Authentication Schemes
In literature, there are many different forms of group authentication in conference key establishment protocols. The agents participating in a group need to authenticate each other in order to become assure that every ...
A lightweight key management protocol for secure communication in smart grids
latency in Generic Object-Oriented Substation Event (GOOSE) and Sample Values (SV) protocols. This paper proposes a secure communication protocol based on hash and private key to overcome the security weaknesses while facilitating the key agreement...
A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems
on Internet, they are faced with different security and privacy threats. So, an important challenge is the establishment of a secure key agreement and authentication procedure between the medical servers and patients. Recently, an ECC-based authentication...