Authentication protocol

Known as: Authentication protocols, List of authentication protocols 
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
1Department of Computer Science, Guelma University, BP 401, 24000 Guelma, Algeria 2Networks and Systems Laboratory, Badji Mokhtar… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID authentication protocols to… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a… (More)
  • figure 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Adrian Perrig
  • ACM Conference on Computer and Communications…
  • 2001
We introduce the BiBa signature scheme, a new signature construction that uses one-way functions without trapdoors. BiBa features… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
In this paper we present an attack upon the Needham Schroeder public key authentication protocol The attack allows an intruder to… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
The purpose of this note is to describe a useful lesson we learned on authentication protocol design. In a recent article [9], we… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that… (More)
Is this relevant?