[HTML][HTML] Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot

ABF Khan, G Anandharaj - Egyptian Informatics Journal, 2021 - Elsevier
The extensive growth of the Internet of Things (IoT) devices leads to the evolution of the
broad range of smart applications in numerous fields such as smart home, wearable …

Three party key sharing protocol using polynomial rings

A Chaturvedi, V Shukla… - 2018 5th IEEE Uttar …, 2018 - ieeexplore.ieee.org
All of us know that authentication and key agreement are the two cryptographic services very
important for data communication. People use online methods for information exchange …

A pure peer-to-peer approach for kNN query processing in mobile ad hoc networks

TP Nghiem, AB Waluyo, D Taniar - Personal and Ubiquitous Computing, 2013 - Springer
Together with advanced positioning and mobile technologies, P2P query processing has
attracted a growing interest number of location-aware applications such as answering k NN …

Enhanced key management protocols for wireless sensor networks

B Cui, Z Wang, B Zhao, X Liang… - Mobile Information …, 2015 - Wiley Online Library
With rapid development and extensive use of wireless sensor networks (WSNs), it is urgent
to enhance the security for WSNs, in which key management is an effective way to protect …

A secure authenticated key agreement protocol using polynomials

MK Mishra, V Shukla, A Chaturvedi… - … Conference on Recent …, 2023 - Springer
Data communication is now an inseparable part of our day-to-day life. There are various
aspects of data security, and authentication and key agreement are dominating among them …

[PDF][PDF] Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.

YL Huang, FY Leu - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - researchgate.net
Recently, wireless communication has been popularly used in our everyday life. However,
its security is a crucial work since messages are broadcasted via wireless channels through …

Flexible Multi‐Authority Attribute‐Based Signature Schemes for Expressive Policy

D Cao, B Zhao, X Wang, J Su - Mobile Information Systems, 2012 - Wiley Online Library
Attribute‐based signature (ABS) is a new cryptographic primitive, in which a signer can sign
a message with his attributes, and the verifier can only known whether the signer owns …

A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment

YL Huang, FY Leu, I You, YK Sun, CC Chu - The Journal of …, 2014 - Springer
In broadband wireless technology, due to having many salient advantages, such as high
data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one …

An Investigation into the Performance of DHKE Algorithm over Different Network Topologies in Cryptography Networks

S Kumari, M Manwal, S Singh… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
This study looks at exploring the overall performance of the DHKE set of rules over
distinctive network topologies in cryptography networks. The purpose turned into identifying …

Authentication process enhancements in WiMAX networks

KA Alezabi, F Hashim, SJ Hashim… - Security and …, 2016 - Wiley Online Library
Authentication is one of the most important security processes in Worldwide Interoperability
for Microwave Access (WiMAX) networks. This process allows the receiver (whether base …