Nothing Special   »   [go: up one dir, main page]

Pilla et al., 2023 - Google Patents

A new authentication protocol for hardware-based authentication systems in an iot environment

Pilla et al., 2023

Document ID
8836045916097001948
Author
Pilla R
Jain K
Publication year
Publication venue
Inventive Computation and Information Technologies: Proceedings of ICICIT 2022

External Links

Snippet

Many companies have recently introduced smart IoT and wearable devices. Most of these devices have sensors that interact with them as well as features that enable them to connect to the Internet. However, if proper security and safety are not considered, the extent of …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Bhattasali et al. Secure and trusted cloud of things
Uppuluri et al. Secure user authentication and key agreement scheme for IoT device access control based smart home communications
Mousavi et al. Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems)
Narendrakumar et al. Token security for internet of things
Klimushin et al. Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things
Priyadharshini et al. Efficient Key Management System Based Lightweight Devices in IoT.
Ding et al. A lightweight and secure communication protocol for the IoT environment
Verma et al. A lightweight secure authentication protocol for wireless sensor networks
Ashraf et al. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
AbdAllah et al. Generating just-in-time shared keys (JIT-SK) for TLS 1.3 zero RoundTrip time (0-RTT)
Pilla et al. A new authentication protocol for hardware-based authentication systems in an iot environment
Kumar et al. A novel framework for secure file transmission using modified AES and MD5 algorithms
Tyagi et al. Analysis and Implementation of AES and RSA for cloud
Saran et al. An improvised algorithm for a dynamic key generation model
El Makhtoum et al. Secure and lightweight authentication protocol for smart metering system
Prakash et al. Data security in wired and wireless systems
Tsai et al. Secure data-sharing using distributed environmental matching keys
Kapudasu et al. Network Device Identity Management Using Cryptography
Soman et al. Analysis of hybrid data security algorithms for cloud
Muthavhine et al. An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices
Siva et al. Hybrid cryptography security in public cloud using TwoFish and ECC algorithm
Feng et al. A Secure ECC-Based Authentication Scheme to Resist Replay Attacks for the IoT
Jain Enhancing security in Tokenization using NGE for storage as a service
Kashyap et al. Enhanced Data Security and Authentication Techniques for IoT Devices on Cloud
Haria et al. Enhanced image encryption using AES algorithm with CBC mode: a secure and efficient approach