Lightweight authentication scheme for smart grid using Merkle hash tree and lossless compression hybrid method
Abstract
References
Recommendations
Performance impact of data compression on virtual private network transactions
LCN '00: Proceedings of the 25th Annual IEEE Conference on Local Computer NetworksVirtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security services such as confidentiality, host authentication and data integrity. The ...
Lightweight authentication with key‐agreement protocol for mobile network environment using smart cards
In 2012, Mun et al. proposed an enhanced secure authentication with key‐agreement protocol for roaming service in global mobility networks environment based on elliptic curve cryptography. They claimed that their protocol is efficient and resistant to ...
Distributed signing protocol for IEEE P1363‐compliant identity‐based signature scheme
The identity‐based signature (IBS) scheme is one of the most promising secure and widely used cryptographic primitives for electronic commerce applications. For example, ID‐based signing in a multi‐party setting, without ever revealing any private and ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
John Wiley & Sons, Inc.
United States
Publication History
Author Tags
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in