Skip to search formSkip to main contentSkip to account menu

Authentication protocol

Known as: Authentication protocols, List of authentication protocols 
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The… 
2014
2014
As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these… 
Highly Cited
2012
Highly Cited
2012
This paper focuses on two interesting radio‐frequency identification (RFID) cryptographic protocols: the server‐less RFID… 
2009
2009
Ubiquitous connectivity and availability of P2P resources creates opportunities for building new services. This paper describes… 
2006
2006
Lightweight authentication protocols are necessary in Radio-Frequency Identication (RFID) applications due to tag-level… 
2004
2004
Highly Cited
2002
Highly Cited
2002
A deniable authentication protocol is proposed in this paper. This protocol can resist person-in-the-middle(PIM) attack, assure… 
Highly Cited
1995
Highly Cited
1995
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the…