Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022 - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

Workstation log-in

J Gehret, G Gabriel, Y Qiao, A Alavi, X Du - US Patent 10,212,136, 2019 - Google Patents
(57) ABSTRACT A method including actions of pairing with a mobile device and receiving a
user name, a password encrypted with a connector password key, and a public key of the …

3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications

R Pecori, L Veltri - Computer Communications, 2016 - Elsevier
Peer-to-peer architectures have become very popular in the last years for a variety of
services and applications they support, such as collaborative computing, streaming and …

Workstation log-in

J Gehret, G Gabriel, Y Qiao, A Alavi, X Du - US Patent 10,581,810, 2020 - Google Patents
A method including actions of pairing with a mobile device and receiving a user name, a
password encrypted with a connector password key, and a public key of the mobile device …

[PDF][PDF] LIGHTWEIGHT MUTUAL AUTHENTICATION SCHEME BASED ON ELLIPTIC CURVE DEFFIE-HELLMAN KEY EXCHANGE IN MACHINE-TO-MACHINE …

S ULLAH - 2021 - eprints.utm.my
Machine-to-Machine communication today is increasing with the help of powerful computing
capabilities remotely operated through the advancement in automation devices and the …

[PDF][PDF] Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and …

ALI ALSHEHRI, I KHAN - researchgate.net
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

Device Parameter based Secure User Authentication

KL Tsai, FY Leu, KS Yip - Advances on Broad-Band Wireless Computing …, 2017 - Springer
User authentication is a procedure used to verify a user before he/she can login a system
and website. Usually, the user's account and password are employed to verify his/her …