Skip to search formSkip to main contentSkip to account menu

Authentication protocol

Known as: Authentication protocols, List of authentication protocols 
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Device authentication is a critical and challenging issue for the emerging Internet of Things (IoT). One promising solution to… 
Highly Cited
2014
Highly Cited
2014
In the centralized Wireless Sensor Network (WSN) architecture there exists a central entity, which acquires, processes and… 
Highly Cited
2014
Highly Cited
2014
Existing anonymous remote authentication protocols to secure wireless body area networks (WBANs) raise challenges such as… 
Highly Cited
2011
Highly Cited
2011
The Controller-Area Network (CAN) bus protocol [1] is a bus protocol invented in 1986 by Robert Bosch GmbH, originally intended… 
Highly Cited
2010
Highly Cited
2010
Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and… 
Highly Cited
2009
Highly Cited
2009
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous… 
Highly Cited
2009
Highly Cited
2008
Highly Cited
2008
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and… 
Highly Cited
2004
Highly Cited
2004
Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is… 
Highly Cited
1993
Highly Cited
1993
The authors specify authentication protocols as formal objects with precise syntax and semantics, and define a semantic model…