4.7 Article

An anonymous authentication and key agreement protocol in smart living

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Is semi-selfish mining available without being detected?

Tao Li et al.

Summary: The paper focuses on the validity of semi-selfish mining attacks while considering the probability of being detected. It is found that although small pools have an advantage in additional rewards, the probability of successfully implementing these attacks is low.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Information Systems

Research on direct anonymous attestation mechanism in enterprise information management

Can Cui et al.

Summary: This paper introduces a novel direct anonymous attestation scheme into enterprise information management by incorporating short signatures, streamlining the signing and verification process of member certificates, and reducing computing costs. This scheme meets the provable security requirements of trusted platform module specifications under security assumptions of Decision Diffie-Hellman and q-Strong Diffie-Hellman difficult problems.

ENTERPRISE INFORMATION SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment

Shadi Nashwan

Summary: This research focuses on proposing an anonymous access authentication scheme for wireless sensor networks in big data environments, which effectively addresses security issues in WSNs, including user anonymity, mutual authentication, and perfect forward secrecy. Through security and performance analysis, the AAA-WSN scheme demonstrates excellent security and efficiency.

EGYPTIAN INFORMATICS JOURNAL (2021)

Article Computer Science, Information Systems

LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT

Hossein Abdi Nasib Far et al.

Summary: The article discusses the importance of monitoring and data collection in industrial environments, introducing an anonymous privacy-preserving three-factor authentication scheme for IIoT. The scheme supports dynamic registration, password and biometric changes, and is formally evaluated for security and verified for performance.

WIRELESS NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Semi-selfish mining based on hidden Markov decision process

Tao Li et al.

Summary: Selfish mining attacks aim to obtain higher revenues compared with honest parties by exploiting vulnerabilities in the consensus mechanism, but are impractical due to high forking rates leading honest parties to exit the system. An improved selfish mining approach based on hidden Markov decision processes (SMHMDP) is proposed, which can balance revenues and forking rates by allowing semi-selfish miners to mine on the public chain with a small probability rho. Simulation results show that SMHMDP can benefit selfish miners within an acceptable forking rate without becoming an armchair strategist.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Theory & Methods

Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework

Aakanksha Tewari et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Mathematics, Interdisciplinary Applications

One-Way Hash Function Based on Delay-Induced Hyperchaos

Hai-Peng Ren et al.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2020)

Article Computer Science, Hardware & Architecture

Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices

Yilei Wang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things

Fengyin Li et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Information Systems

Blockchain-based authentication and authorization for smart city applications

Christian Esposito et al.

INFORMATION PROCESSING & MANAGEMENT (2020)

Article Computer Science, Information Systems

Anonymous three-factor authenticated key agreement for wireless sensor networks

Yanrong Lu et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Artificial Intelligence

An novel anonymous user WSN authentication for Internet of Things

Xin Zhang et al.

SOFT COMPUTING (2019)

Article Computer Science, Information Systems

Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things

Binbin Yu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

Shipra Kumari et al.

COMPUTER NETWORKS (2016)

Article Engineering, Electrical & Electronic

Property Analysis of XOR-Based Visual Cryptography

Ching-Nung Yang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2014)