Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,254,423 papers from all fields of science
Search
Sign In
Create Free Account
Authentication protocol
Known as:
Authentication protocols
, List of authentication protocols
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CAVE-based authentication
CRAM-MD5
Chip Authentication Program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Simulation and cost analysis of group authentication protocols
Adarsh Kumar
,
K. Gopal
,
A. Aggarwal
International Conference on Contemporary…
2016
Corpus ID: 15699689
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The…
Expand
2014
2014
Secure authentication and integrity techniques for randomized secured routing in WSN
U. S. kumaran
,
Ilango Paramasivam
Wireless networks
2014
Corpus ID: 29882420
As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these…
Expand
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Highly Cited
2008
Highly Cited
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment
Sooyoung Kang
,
Deok-Gyu Lee
,
Imyeong Lee
Computer Communications
2008
Corpus ID: 2497889
Review
2006
Review
2006
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
Sen Xu
,
Chin-Tser Huang
International Symposium on Wireless Communication…
2006
Corpus ID: 12695083
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a…
Expand
2006
2006
HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication
S. Piramuthu
2006
Corpus ID: 60025882
Lightweight authentication protocols are necessary in Radio-Frequency Identication (RFID) applications due to tag-level…
Expand
2006
2006
LHAP: A lightweight network access control protocol for ad hoc networks
Sencun Zhu
,
Shouhuai Xu
,
Sanjeev Setia
,
S. Jajodia
Ad hoc networks
2006
Corpus ID: 12481760
Highly Cited
2002
Highly Cited
2002
Deniable Authentication Protocol Based on Diffie-Hellman Algorithm
Chongxiang Xu
2002
Corpus ID: 63399462
A deniable authentication protocol is proposed in this paper. This protocol can resist person-in-the-middle(PIM) attack, assure…
Expand
Highly Cited
2001
Highly Cited
2001
Wireless Authentication Protocol Preserving User Anonymity
Jaegwan Park
,
Jaeseung Go
,
Kwangjo Kim
2001
Corpus ID: 14556067
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile…
Expand
Highly Cited
1995
Highly Cited
1995
Authentication protocols for personal communication systems
Hung-Yu Lin
,
L. Harn
Conference on Applications, Technologies…
1995
Corpus ID: 8273506
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE