Skip to search formSkip to main contentSkip to account menu

Authentication protocol

Known as: Authentication protocols, List of authentication protocols 
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The… 
2014
2014
As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these… 
Review
2006
Review
2006
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a… 
2006
2006
Lightweight authentication protocols are necessary in Radio-Frequency Identication (RFID) applications due to tag-level… 
Highly Cited
2002
Highly Cited
2002
A deniable authentication protocol is proposed in this paper. This protocol can resist person-in-the-middle(PIM) attack, assure… 
Highly Cited
2001
Highly Cited
2001
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile… 
Highly Cited
1995
Highly Cited
1995
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the…