Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,819 papers from all fields of science
Search
Sign In
Create Free Account
Authentication protocol
Known as:
Authentication protocols
, List of authentication protocols
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CAVE-based authentication
CRAM-MD5
Chip Authentication Program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol
Dajiang Chen
,
Ning Zhang
,
+4 authors
Xiangyang Li
IEEE Internet of Things Journal
2017
Corpus ID: 9162853
Device authentication is a critical and challenging issue for the emerging Internet of Things (IoT). One promising solution to…
Expand
Highly Cited
2014
Highly Cited
2014
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P. Porambage
,
C. Schmitt
,
Pardeep Kumar
,
A. Gurtov
,
M. Ylianttila
IEEE Wireless Communications and Networking…
2014
Corpus ID: 10968372
In the centralized Wireless Sensor Network (WSN) architecture there exists a central entity, which acquires, processes and…
Expand
Highly Cited
2014
Highly Cited
2014
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol
H. Xiong
IEEE Transactions on Information Forensics and…
2014
Corpus ID: 15932698
Existing anonymous remote authentication protocols to secure wireless body area networks (WBANs) raise challenges such as…
Expand
Highly Cited
2011
Highly Cited
2011
CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus
A. V. Herrewege
,
Dave Singelée
,
I. Verbauwhede
2011
Corpus ID: 3753439
The Controller-Area Network (CAN) bus protocol [1] is a bus protocol invented in 1986 by Robert Bosch GmbH, originally intended…
Expand
Highly Cited
2010
Highly Cited
2010
Blind Authentication: A Secure Crypto-Biometric Verification Protocol
M. Upmanyu
,
A. Namboodiri
,
K. Srinathan
,
C. V. Jawahar
IEEE Transactions on Information Forensics and…
2010
Corpus ID: 16976962
Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and…
Expand
Highly Cited
2009
Highly Cited
2009
Identity-Based Authentication for Cloud Computing
Hongwei Li
,
Yuan-Shun Dai
,
Ling Tian
,
Haomiao Yang
International Conference on Cloud Computing
2009
Corpus ID: 1590026
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous…
Expand
Highly Cited
2009
Highly Cited
2009
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao
,
Shuenn-Shyang Wang
Comput. Stand. Interfaces
2009
Corpus ID: 6346430
Highly Cited
2008
Highly Cited
2008
Secure and Serverless RFID Authentication and Search Protocols
C. C. Tan
,
Bo Sheng
,
Qun A. Li
IEEE Transactions on Wireless Communications
2008
Corpus ID: 2895901
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and…
Expand
Highly Cited
2004
Highly Cited
2004
A new authentication scheme with anonymity for wireless environments
Jianming Zhu
,
Jianfeng Ma
IEEE Trans. Consumer Electron.
2004
Corpus ID: 16759964
Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is…
Expand
Highly Cited
1993
Highly Cited
1993
A semantic model for authentication protocols
Thomas Y. C. Woo
,
S. Lam
Proceedings IEEE Computer Society Symposium on…
1993
Corpus ID: 15163502
The authors specify authentication protocols as formal objects with precise syntax and semantics, and define a semantic model…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE