Secure long-range autonomous valet parking: A reservation scheme with three-factor authentication and key agreement
Long-range autonomous valet parking (LAVP) is a current trend, partly due to traffic
congestion and parking headache. For large-scale parking demands, reservation is …
congestion and parking headache. For large-scale parking demands, reservation is …
Efficient authentication for mobile and pervasive computing
B Alomair, R Poovendran - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
With today's technology, many applications rely on the existence of small devices that can
exchange information and form communication networks. In a significant portion of such …
exchange information and form communication networks. In a significant portion of such …
Efficient authentication for mobile and pervasive computing
R Poovendran, B Alomair - US Patent 9,166,793, 2015 - Google Patents
(57) ABSTRACT A method and system for authenticating messages is pro vided. A message
authentication system generates an encrypted message by encrypting with a key a …
authentication system generates an encrypted message by encrypting with a key a …
Authenticated encryption: How reordering can impact performance
B Alomair - Applied Cryptography and Network Security: 10th …, 2012 - Springer
In this work, we look at authenticated encryption schemes from a new perspective. As
opposed to analyzing the security of different methods of constructing authenticated …
opposed to analyzing the security of different methods of constructing authenticated …
[PDF][PDF] Dynamic message authentication code for short messages
D Ganesh, A Jahnavi, M Trivikram - International Journal of Computer …, 2015 - Citeseer
Now-a-days with the increase of technology in every field, many applications rely on the
existence of small devices that can exchange information and form communication …
existence of small devices that can exchange information and form communication …
[PDF][PDF] Authentication Techniques That Work Well With Mobile and Distributed Systems
BA KUMAR, M SANDEEP - core.ac.uk
In the modern technological world, the existence of minuscule devices that are able to
exchange data and build networks is necessary for the completion of numerous activities. In …
exchange data and build networks is necessary for the completion of numerous activities. In …
[PDF][PDF] Security of Authentication Based on Universal hash Function Family for Mobile and Pervasive Computing
M Srinivas, M Tech - academia.edu
More than applications rely on the existence of small devices that can exchange information
and form communication networks. In a significant portion of such applications, the …
and form communication networks. In a significant portion of such applications, the …
Authenticated encryption: how reordering can impact performance
B Alomair - Security and Communication Networks, 2016 - Wiley Online Library
In this work, we look at authenticated encryption schemes from a new perspective. As
opposed to focusing solely on the “security” implications of the different methods for …
opposed to focusing solely on the “security” implications of the different methods for …
[PDF][PDF] PMAC: A Fully Parallelizable MAC Algorithm
N Mago - 2016 - acfa.apeejay.edu
In many applications of cryptography, assuring the authenticity of communications is as
important as protecting their secrecy. The main goal of cryptography is to preserve the …
important as protecting their secrecy. The main goal of cryptography is to preserve the …
[PDF][PDF] Survey Paper On Efficient Authentication For Mobile And Pervasive Computing
D Byahatti, R Pundalik - IJETCSE, 2015 - ijetcse.com
In now a days, so many applications depend on the existence of the small devices that can
exchange information and form communication networks. In a significant portion of such …
exchange information and form communication networks. In a significant portion of such …