Skip to search formSkip to main contentSkip to account menu

Authentication protocol

Known as: Authentication protocols, List of authentication protocols 
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The… 
2014
2014
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the… 
Highly Cited
2008
Highly Cited
2008
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities… 
Review
2006
Review
2006
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a… 
2006
2006
Lightweight authentication protocols are necessary in Radio-Frequency Identication (RFID) applications due to tag-level… 
Highly Cited
2001
Highly Cited
2001
We propose an authentication and key agreement protocol while preserving the anonymity of a mobile user in wireless mobile… 
Highly Cited
1995
Highly Cited
1995
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the…