A survey of SIP authentication and key agreement schemes
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
Design of blockchain-based lightweight V2I handover authentication protocol for VANET
Connected vehicle means providing different services, such as advanced driver-assistance
systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks …
systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks …
A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions
S Yu, Y Park - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Wireless medical sensor networks (WMSNs)-based medical systems are an emerging
paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can …
paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can …
Provably secure authenticated key agreement scheme for smart grid
Due to the rapid development of wireless communication systems, authentication becomes
a key security component in smart grid environments. Authentication then plays an important …
a key security component in smart grid environments. Authentication then plays an important …
SLAP-IoD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments
With the emergence of the concept of smart city and the increasing demands for a range of
drones, Internet of Drones (IoD) has achieved a variety of attention by providing multiple …
drones, Internet of Drones (IoD) has achieved a variety of attention by providing multiple …
A performance evaluation of local descriptors
K Mikolajczyk, C Schmid - IEEE transactions on pattern …, 2005 - ieeexplore.ieee.org
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
only share a password to establish a shared key in a way that is immune to offline attacks …
only share a password to establish a shared key in a way that is immune to offline attacks …
Authenticated key exchange secure against dictionary attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work
despite the use of passwords drawn from a space so small that an adversary might well …
despite the use of passwords drawn from a space so small that an adversary might well …
A fuzzy vault scheme
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault.
A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of …
A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of …
Password-based authenticated key exchange in the three-party setting
Password-based authenticated key exchange are protocols which are designed to be
secure even when the secret key or password shared between two users is drawn from a …
secure even when the secret key or password shared between two users is drawn from a …