Pilla et al., 2023 - Google Patents
A new authentication protocol for hardware-based authentication systems in an iot environmentPilla et al., 2023
- Document ID
- 8836045916097001948
- Author
- Pilla R
- Jain K
- Publication year
- Publication venue
- Inventive Computation and Information Technologies: Proceedings of ICICIT 2022
External Links
Snippet
Many companies have recently introduced smart IoT and wearable devices. Most of these devices have sensors that interact with them as well as features that enable them to connect to the Internet. However, if proper security and safety are not considered, the extent of …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhattasali et al. | Secure and trusted cloud of things | |
Uppuluri et al. | Secure user authentication and key agreement scheme for IoT device access control based smart home communications | |
Mousavi et al. | Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems) | |
Narendrakumar et al. | Token security for internet of things | |
Klimushin et al. | Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things | |
Priyadharshini et al. | Efficient Key Management System Based Lightweight Devices in IoT. | |
Ding et al. | A lightweight and secure communication protocol for the IoT environment | |
Verma et al. | A lightweight secure authentication protocol for wireless sensor networks | |
Ashraf et al. | Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication | |
AbdAllah et al. | Generating just-in-time shared keys (JIT-SK) for TLS 1.3 zero RoundTrip time (0-RTT) | |
Pilla et al. | A new authentication protocol for hardware-based authentication systems in an iot environment | |
Kumar et al. | A novel framework for secure file transmission using modified AES and MD5 algorithms | |
Tyagi et al. | Analysis and Implementation of AES and RSA for cloud | |
Saran et al. | An improvised algorithm for a dynamic key generation model | |
El Makhtoum et al. | Secure and lightweight authentication protocol for smart metering system | |
Prakash et al. | Data security in wired and wireless systems | |
Tsai et al. | Secure data-sharing using distributed environmental matching keys | |
Kapudasu et al. | Network Device Identity Management Using Cryptography | |
Soman et al. | Analysis of hybrid data security algorithms for cloud | |
Muthavhine et al. | An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices | |
Siva et al. | Hybrid cryptography security in public cloud using TwoFish and ECC algorithm | |
Feng et al. | A Secure ECC-Based Authentication Scheme to Resist Replay Attacks for the IoT | |
Jain | Enhancing security in Tokenization using NGE for storage as a service | |
Kashyap et al. | Enhanced Data Security and Authentication Techniques for IoT Devices on Cloud | |
Haria et al. | Enhanced image encryption using AES algorithm with CBC mode: a secure and efficient approach |