Skip to search formSkip to main contentSkip to account menu

Authentication protocol

Known as: Authentication protocols, List of authentication protocols 
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring… 
2016
2016
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The… 
2014
2014
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the… 
Highly Cited
2008
Highly Cited
2008
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities… 
Review
2006
Review
2006
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a… 
Highly Cited
2001
Highly Cited
2001
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile…