Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.066
1.
  • Two protocols for improving... Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks
    Modiri, M.M.; Salmasizadeh, M.; Mohajeri, J. ... Computer communications, 11/2023, Letnik: 211
    Journal Article
    Recenzirano

    In the fifth generation of cellular networks (5G), data transmission with the highest possible speed and the lowest latency is one of the most essential 5G designing criteria. Furthermore, this ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • Provably Secure Authenticat... Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga; Das, Ashok Kumar; Wazid, Mohammad ... IEEE transactions on smart grid, 05/2018, Letnik: 9, Številka: 3
    Journal Article
    Recenzirano

    Due to the rapid development of wireless communication systems, authentication becomes a key security component in smart grid environments. Authentication then plays an important role in the smart ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
3.
  • Feistel Ciphers Based on A ... Feistel Ciphers Based on A Single Primitive
    TSUJI, Kento; IWATA, Tetsu IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2024, 2024-00-00
    Journal Article
    Recenzirano
    Odprti dostop

    We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the TBC-based Feistel cipher is known, and the ...
Celotno besedilo
Dostopno za: NUK, UL, UM
4.
  • Two Birds with One Stone: T... Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
    Wang, Ding; Wang, Ping IEEE transactions on dependable and secure computing, 07/2018, Letnik: 15, Številka: 4
    Journal Article

    As the most prevailing two-factor authentication mechanism, smart-card-based password authentication has been a subject of intensive research in the past two decades, and hundreds of this type of ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • Secure Remote User Authenti... Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
    Wazid, Mohammad; Das, Ashok Kumar; Odelu, Vanga ... IEEE transactions on dependable and secure computing, 03/2020, Letnik: 17, Številka: 2
    Journal Article

    The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living, smart health and smart transportation. Among all these applications, smart home ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
6.
  • Efficient and secure identi... Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing; Zhang, Yubo; Choo, Kim-Kwang Raymond ... Future generation computer systems, August 2017, 2017-08-00, Letnik: 73
    Journal Article
    Recenzirano

    Efficient searching on encrypted data outsourced to the cloud remains a research challenge. Identity-based encryption with equality test (IBEET) scheme has recently been identified as a viable ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
7.
  • Anonymous authentication sc... Anonymous authentication scheme for smart home environment with provable security
    Shuai, Mengxia; Yu, Nenghai; Wang, Hongxia ... Computers & security, September 2019, 2019-09-00, 20190901, Letnik: 86
    Journal Article
    Recenzirano

    Smart home is an emerging paradigm of the Internet of Things (IoT), which facilitates an individual to operate the smart home appliances remotely through the internet. Since the user and the smart ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • Provably Secure and Lightwe... Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
    Karati, Arijit; Islam, Sk Hafizul; Karuppiah, Marimuthu IEEE transactions on industrial informatics, 08/2018, Letnik: 14, Številka: 8
    Journal Article

    In recent years, two technologies, the cloud computing and the Internet of Things (IoT), have a synergistic effect in the modern organizations as digitization is a new business trend for various ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
10.
  • Provably-Secure One-Message... Provably-Secure One-Message Unilateral Entity Authentication Schemes
    De Santis, Alfredo; Ferrara, Anna Lisa; Flores, Manuela ... IEEE transactions on dependable and secure computing, 2024-July-Aug., Letnik: 21, Številka: 4
    Journal Article

    A one-message unilateral entity authentication scheme allows one party, called the prover , to authenticate himself, i.e., to prove his identity, to another party, called the verifier , by sending a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 1.066

Nalaganje filtrov