Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,622 papers from all fields of science
Search
Sign In
Create Free Account
Authentication protocol
Known as:
Authentication protocols
, List of authentication protocols
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CAVE-based authentication
CRAM-MD5
Chip Authentication Program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks
Preeti Chandrakar
International Journal of Ambient Computing and…
2019
Corpus ID: 59605037
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring…
Expand
2016
2016
Simulation and cost analysis of group authentication protocols
Adarsh Kumar
,
K. Gopal
,
A. Aggarwal
International Conference on Contemporary…
2016
Corpus ID: 15699689
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The…
Expand
2014
2014
Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)
Adarsh Kumar
,
K. Gopal
,
A. Aggarwal
International Conference on Parallel, Distributed…
2014
Corpus ID: 17847740
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the…
Expand
Highly Cited
2011
Highly Cited
2011
Scalable RFID security protocols supporting tag ownership transfer
Boyeon Song
,
C. Mitchell
Computer Communications
2011
Corpus ID: 825171
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Highly Cited
2008
Highly Cited
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment
Sooyoung Kang
,
Deok-Gyu Lee
,
Imyeong Lee
Computer Communications
2008
Corpus ID: 2497889
Highly Cited
2008
Highly Cited
2008
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
Ghaith Hammouri
,
B. Sunar
International Conference on Applied Cryptography…
2008
Corpus ID: 13615695
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities…
Expand
Review
2006
Review
2006
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
Sen Xu
,
Chin-Tser Huang
International Symposium on Wireless Communication…
2006
Corpus ID: 12695083
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a…
Expand
2006
2006
A new protocol to counter online dictionary attacks
Vipul Goyal
,
Virendra Kumar
,
Mayank Singh
,
A. Abraham
,
S. Sanyal
Computers & security
2006
Corpus ID: 17095032
Highly Cited
2001
Highly Cited
2001
Wireless Authentication Protocol Preserving User Anonymity
Jaegwan Park
,
Jaeseung Go
,
Kwangjo Kim
2001
Corpus ID: 14556067
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE