A study and analysis on symmetric cryptography

S Chandra, S Bhattacharyya, S Paira… - 2014 International …, 2014 - ieeexplore.ieee.org
Technology is advancing day-to-day. For a better and faster technology, information security
is a must. This requires data authentication at the execution levels. Cryptography is a useful …

An anonymous device to device authentication protocol using ECC and self certified public keys usable in Internet of Things based autonomous devices

BA Alzahrani, SA Chaudhry, A Barnawi, A Al-Barakati… - Electronics, 2020 - mdpi.com
Two party authentication schemes can be good candidates for deployment in Internet of
Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of …

Design of two-party authenticated key agreement protocol based on ECC and self-certified public keys

SKH Islam, GP Biswas - Wireless Personal Communications, 2015 - Springer
A two-party authenticated key agreement (2PAKA) protocol based on Elliptic curve
cryptography (ECC) and the self-certified public key (SC-PKC) of the user is proposed in this …

Fully distributed ECC-based key management for mobile ad hoc networks

M Gharib, Z Moradlou, MA Doostari, A Movaghar - Computer Networks, 2017 - Elsevier
Dynamic nature of mobile ad hoc networks combined with their lack of centralized
infrastructure make security problem the most challenging issue in such networks. The main …

Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks

L Deng, J Shao, Z Hu - Peer-to-Peer Networking and Applications, 2021 - Springer
Vehicular ad hoc network (VANET) is the application of mobile ad hoc networks (MANETs)
on the road of traffic. It is an important issue to achieve secure sharing of information among …

Gesture recognition by learning local motion signatures

MB Kaâniche, F Bremond - 2010 IEEE Computer Society …, 2010 - ieeexplore.ieee.org
This paper overviews a new gesture recognition framework based on learning local motion
signatures (LMSs) introduced by [5]. After the generation of these LMSs computed on one …

A novel probabilistic key management algorithm for large-scale manets

M Gharib, E Emamjomeh-Zadeh… - 2013 27th …, 2013 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) have become very interesting during last years, but the
security is the most important problem they suffer from. Asymmetric cryptography is a very …

Performance analysis of RSA and ECC in identity-based authenticated new multiparty key agreement protocol

PR Vijayalakshmi, KB Raja - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Today's computing environments such as video conferencing, distributed simulation, multi-
user games, and many more applications involve dynamic peer groups. Communication …

Security weaknesses of authenticated key agreement protocols

P Nose - Information Processing Letters, 2011 - Elsevier
In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of
Hölbl et al. After the analysis, we found that Tan et al. ʼs, Lim et al. ʼs and two protocols of …

Adaptive energy-saving strategy for activity recognition on mobile phone

VQ Viet, HM Thang, D Choi - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Most existing mobile devices nowadays are powered by a limited energy resource. With the
tendency using machine learning on mobile devices for activity recognition (AR), recent …