Secure long-range autonomous valet parking: A reservation scheme with three-factor authentication and key agreement

D Wang, Y Cao, F Yan, Y Liu, D Tian… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Long-range autonomous valet parking (LAVP) is a current trend, partly due to traffic
congestion and parking headache. For large-scale parking demands, reservation is …

Efficient authentication for mobile and pervasive computing

B Alomair, R Poovendran - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
With today's technology, many applications rely on the existence of small devices that can
exchange information and form communication networks. In a significant portion of such …

Efficient authentication for mobile and pervasive computing

R Poovendran, B Alomair - US Patent 9,166,793, 2015 - Google Patents
(57) ABSTRACT A method and system for authenticating messages is pro vided. A message
authentication system generates an encrypted message by encrypting with a key a …

Authenticated encryption: How reordering can impact performance

B Alomair - Applied Cryptography and Network Security: 10th …, 2012 - Springer
In this work, we look at authenticated encryption schemes from a new perspective. As
opposed to analyzing the security of different methods of constructing authenticated …

[PDF][PDF] Dynamic message authentication code for short messages

D Ganesh, A Jahnavi, M Trivikram - International Journal of Computer …, 2015 - Citeseer
Now-a-days with the increase of technology in every field, many applications rely on the
existence of small devices that can exchange information and form communication …

[PDF][PDF] Authentication Techniques That Work Well With Mobile and Distributed Systems

BA KUMAR, M SANDEEP - core.ac.uk
In the modern technological world, the existence of minuscule devices that are able to
exchange data and build networks is necessary for the completion of numerous activities. In …

[PDF][PDF] Security of Authentication Based on Universal hash Function Family for Mobile and Pervasive Computing

M Srinivas, M Tech - academia.edu
More than applications rely on the existence of small devices that can exchange information
and form communication networks. In a significant portion of such applications, the …

Authenticated encryption: how reordering can impact performance

B Alomair - Security and Communication Networks, 2016 - Wiley Online Library
In this work, we look at authenticated encryption schemes from a new perspective. As
opposed to focusing solely on the “security” implications of the different methods for …

[PDF][PDF] PMAC: A Fully Parallelizable MAC Algorithm

N Mago - 2016 - acfa.apeejay.edu
In many applications of cryptography, assuring the authenticity of communications is as
important as protecting their secrecy. The main goal of cryptography is to preserve the …

[PDF][PDF] Survey Paper On Efficient Authentication For Mobile And Pervasive Computing

D Byahatti, R Pundalik - IJETCSE, 2015 - ijetcse.com
In now a days, so many applications depend on the existence of the small devices that can
exchange information and form communication networks. In a significant portion of such …