Secure session key sharing using symmetric key cryptography
S Arora, M Hussain - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Information security is a major concern when the information is transmitted via
telecommunication systems (wired or wireless). This security is provided by cryptography …
telecommunication systems (wired or wireless). This security is provided by cryptography …
Simplified and secure session key sharing for Internet of Things (IoT) networks
Internet of Things is found everywhere in today's life, they are simplifying our life and are
reliable. As they are connected to the Internet for communication, they are vulnerable to …
reliable. As they are connected to the Internet for communication, they are vulnerable to …
[PDF][PDF] Mutual Authentication and Secure Key Distribution in Distributed Computing Environment
P Shalini, M Kushwaha - … of Advanced Research in Engineering and …, 2020 - academia.edu
The secure key exchange and mutual authentication are some of the major issues in
networks for data communication through internet. The present paper propose a protocol …
networks for data communication through internet. The present paper propose a protocol …
[PDF][PDF] A REVIEW ON KEY DISTRIBUTION PROTOCOLS TO ACHIEVE SECURE SECRET KEY DISTRIBUTION AND MUTUAL AUTHENTICATION
R Khan, CR Krishna - researchgate.net
There has been an expansive increase in the design, development and prevalence of
networked and distributed systems due to global interconnectivity in the digital …
networked and distributed systems due to global interconnectivity in the digital …
A New Approach to Provide Authentication Using Acknowledgment
VP Singh, N Aggarwal, M Hussain… - Progress in Advanced …, 2019 - Springer
Whenever there is communication between two nodes, there is a possibility of vulnerability.
When node A communicates with node B, a lot of problems arise between them, out of which …
When node A communicates with node B, a lot of problems arise between them, out of which …