Skip to search formSkip to main contentSkip to account menu

Authentication protocol

Known as: Authentication protocols, List of authentication protocols 
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The… 
2011
2011
RFID tag has limited calculation resources and small storage capacity , t he wireless communi cation channel between RFID tag and… 
2009
2009
Ubiquitous connectivity and availability of P2P resources creates opportunities for building new services. This paper describes… 
2007
2007
Security protocols are widely used to provide secure communication in many critical applications such as e-commerce and defense… 
2007
2007
Broadcast Authentication is one of the most challenging security problems in sensor networks.The current solutions are designed… 
2006
2006
Lightweight authentication protocols are necessary in Radio-Frequency Identication (RFID) applications due to tag-level… 
2006
2006
  • S. Wong
  • 2006
  • Corpus ID: 6762652
A Web-computing system (WCS) allows a host with limited resources to perform CPU intensive tasks by outsourcing the computations… 
Highly Cited
2005
Highly Cited
2005
In this paper we propose two RFID (Radio Frequency Identification) authentication protocols for secure and lowcost RFID systems… 
Highly Cited
2002
Highly Cited
2002
A deniable authentication protocol is proposed in this paper. This protocol can resist person-in-the-middle(PIM) attack, assure… 
2001
2001
Several proposals have been made to public-key-enable various stages of the secret-key-based Kerberos network authentication…