Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,367,930 papers from all fields of science
Search
Sign In
Create Free Account
Authentication protocol
Known as:
Authentication protocols
, List of authentication protocols
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CAVE-based authentication
CRAM-MD5
Chip Authentication Program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Simulation and cost analysis of group authentication protocols
Adarsh Kumar
,
K. Gopal
,
A. Aggarwal
International Conference on Contemporary…
2016
Corpus ID: 15699689
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The…
Expand
2011
2011
An Authentication Protocol for RFID Tag and Its Simulation
Shang-ping Wang
,
Qiao-mei Ma
,
Ya-ling Zhang
,
You-sheng Li
J. Networks
2011
Corpus ID: 13031604
RFID tag has limited calculation resources and small storage capacity , t he wireless communi cation channel between RFID tag and…
Expand
2009
2009
JigDFS: A secure distributed file system
J. Bian
,
R. Seker
IEEE Symposium on Computational Intelligence in…
2009
Corpus ID: 14917944
Ubiquitous connectivity and availability of P2P resources creates opportunities for building new services. This paper describes…
Expand
2007
2007
Discovering Man-in-the-Middle Attacks in Authentication Protocols
R. Guha
,
Z. Furqan
,
Shahabuddin Muhammad
IEEE Military Communications Conference
2007
Corpus ID: 21469259
Security protocols are widely used to provide secure communication in many critical applications such as e-commerce and defense…
Expand
2007
2007
MMμTESLA: Broadcast Authentication Protocol for Multiple-Base-Station Sensor Networks
Shengwei Yu
2007
Corpus ID: 63850651
Broadcast Authentication is one of the most challenging security problems in sensor networks.The current solutions are designed…
Expand
2006
2006
HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication
S. Piramuthu
2006
Corpus ID: 60025882
Lightweight authentication protocols are necessary in Radio-Frequency Identication (RFID) applications due to tag-level…
Expand
2006
2006
An authentication protocol in Web-computing
S. Wong
Proceedings 20th IEEE International Parallel…
2006
Corpus ID: 6762652
A Web-computing system (WCS) allows a host with limited resources to perform CPU intensive tasks by outsourcing the computations…
Expand
Highly Cited
2005
Highly Cited
2005
Secure and Low-cost RFID Authentication Protocols
Y. Lee
,
I. Verbauwhede
2005
Corpus ID: 15880412
In this paper we propose two RFID (Radio Frequency Identification) authentication protocols for secure and lowcost RFID systems…
Expand
Highly Cited
2002
Highly Cited
2002
Deniable Authentication Protocol Based on Diffie-Hellman Algorithm
Chongxiang Xu
2002
Corpus ID: 63399462
A deniable authentication protocol is proposed in this paper. This protocol can resist person-in-the-middle(PIM) attack, assure…
Expand
2001
2001
Performance of public-key-enabled Kerberos authentication in large networks
Alan Harbitter
,
D. Menascé
Proceedings IEEE Symposium on Security and…
2001
Corpus ID: 16013563
Several proposals have been made to public-key-enable various stages of the secret-key-based Kerberos network authentication…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE