Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,216,409 papers from all fields of science
Search
Sign In
Create Free Account
Authentication protocol
Known as:
Authentication protocols
, List of authentication protocols
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CAVE-based authentication
CRAM-MD5
Chip Authentication Program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
SEGM: A secure group management framework in integrated VANET-cellular networks
Chengzhe Lai
,
Dong Zheng
,
Qinglan Zhao
,
Xiaohong Jiang
Vehicular Communications
2018
Corpus ID: 49320151
2016
2016
Simulation and cost analysis of group authentication protocols
Adarsh Kumar
,
K. Gopal
,
A. Aggarwal
International Conference on Contemporary…
2016
Corpus ID: 15699689
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The…
Expand
2014
2014
Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)
Adarsh Kumar
,
K. Gopal
,
A. Aggarwal
International Conference on Parallel, Distributed…
2014
Corpus ID: 17847740
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the…
Expand
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Highly Cited
2008
Highly Cited
2008
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
Ghaith Hammouri
,
B. Sunar
International Conference on Applied Cryptography…
2008
Corpus ID: 13615695
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities…
Expand
Highly Cited
2008
Highly Cited
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment
Sooyoung Kang
,
Deok-Gyu Lee
,
Imyeong Lee
Computer Communications
2008
Corpus ID: 2497889
Review
2006
Review
2006
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
Sen Xu
,
Chin-Tser Huang
International Symposium on Wireless Communication…
2006
Corpus ID: 12695083
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a…
Expand
2006
2006
HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication
S. Piramuthu
2006
Corpus ID: 60025882
Lightweight authentication protocols are necessary in Radio-Frequency Identication (RFID) applications due to tag-level…
Expand
Highly Cited
2001
Highly Cited
2001
Wireless Authentication Protocol Preserving User Anonymity
Jaegwan Park
,
Jaeseung Go
,
Kwangjo Kim
2001
Corpus ID: 14556067
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile…
Expand
Highly Cited
1995
Highly Cited
1995
Authentication protocols for personal communication systems
Hung-Yu Lin
,
L. Harn
Conference on Applications, Technologies…
1995
Corpus ID: 8273506
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE