Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity informatio...
| Published in: | Dianxin kexue |
|---|---|
| Main Authors: | Jie ZHAO, Huarong ZHANG |
| Format: | Article |
| Language: | Chinese |
| Published: |
Beijing Xintong Media Co., Ltd
2016-06-01
|
| Subjects: | |
| Online Access: | http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2016116 |
Similar Items
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
by: Jie ZHAO, et al.
Published: (2016-06-01)
by: Jie ZHAO, et al.
Published: (2016-06-01)
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token
by: Yu-Sheng Yang, et al.
Published: (2023-05-01)
by: Yu-Sheng Yang, et al.
Published: (2023-05-01)
Elliptic curve cryptography and biometrics for iot authentication
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
An Offline Direct Authentication Scheme for the Internet of Medical Things Based on Elliptic Curve Cryptography
by: Asmaa Maarouf, et al.
Published: (2024-01-01)
by: Asmaa Maarouf, et al.
Published: (2024-01-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
by: Yanrong Lu, et al.
Published: (2022-01-01)
by: Yanrong Lu, et al.
Published: (2022-01-01)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
by: Younsung Choi, et al.
Published: (2014-06-01)
by: Younsung Choi, et al.
Published: (2014-06-01)
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
by: Xingwen Zhao, et al.
Published: (2022-10-01)
by: Xingwen Zhao, et al.
Published: (2022-10-01)
Methods for using elliptic curves in cryptography
by: Obukhov Vadim, et al.
Published: (2024-01-01)
by: Obukhov Vadim, et al.
Published: (2024-01-01)
Secure and Efficient Authentication Scheme in IoT Environments
by: Abhijeet Thakare, et al.
Published: (2021-01-01)
by: Abhijeet Thakare, et al.
Published: (2021-01-01)
Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
by: Stefania Loredana Nita, et al.
Published: (2023-01-01)
by: Stefania Loredana Nita, et al.
Published: (2023-01-01)
PSAF-IoT: Physically Secure Authentication Framework for the Internet of Things
by: Omar Alruwaili, et al.
Published: (2024-01-01)
by: Omar Alruwaili, et al.
Published: (2024-01-01)
Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography
by: M. . Anikeev, et al.
Published: (2010-12-01)
by: M. . Anikeev, et al.
Published: (2010-12-01)
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments
by: Cong Wang, et al.
Published: (2025-04-01)
by: Cong Wang, et al.
Published: (2025-04-01)
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
by: Yuehui CHEN, et al.
Published: (2016-05-01)
by: Yuehui CHEN, et al.
Published: (2016-05-01)
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
by: Yuehui CHEN, et al.
Published: (2016-05-01)
by: Yuehui CHEN, et al.
Published: (2016-05-01)
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
by: Zeyu Sun, et al.
Published: (2025-08-01)
by: Zeyu Sun, et al.
Published: (2025-08-01)
An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment
by: Davood Noori, et al.
Published: (2022-07-01)
by: Davood Noori, et al.
Published: (2022-07-01)
Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
by: Daniel Ioan Hunyadi, et al.
Published: (2022-12-01)
by: Daniel Ioan Hunyadi, et al.
Published: (2022-12-01)
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
by: Akber Ali Khan, et al.
Published: (2022-03-01)
by: Akber Ali Khan, et al.
Published: (2022-03-01)
Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
by: Shunfang Hu, et al.
Published: (2024-04-01)
by: Shunfang Hu, et al.
Published: (2024-04-01)
Elliptic Curve Cryptography with Machine Learning
by: Jihane Jebrane, et al.
Published: (2024-12-01)
by: Jihane Jebrane, et al.
Published: (2024-12-01)
Lightweight mutual Authentication Protoco lfor IoT devices using Elliptical Curves
by: Vandani Verma
Published: (2024-11-01)
by: Vandani Verma
Published: (2024-11-01)
Speeding-Up Elliptic Curve Cryptography Algorithms
by: Diana Maimuţ, et al.
Published: (2022-10-01)
by: Diana Maimuţ, et al.
Published: (2022-10-01)
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards
by: Anuj Kumar Singh, et al.
Published: (2020-11-01)
by: Anuj Kumar Singh, et al.
Published: (2020-11-01)
FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications
by: Deming Wang, et al.
Published: (2023-05-01)
by: Deming Wang, et al.
Published: (2023-05-01)
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
by: S.K. Hafizul Islam, et al.
Published: (2017-07-01)
by: S.K. Hafizul Islam, et al.
Published: (2017-07-01)
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
by: Md Nizam Udin, et al.
Published: (2021-05-01)
by: Md Nizam Udin, et al.
Published: (2021-05-01)
An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN
by: Udaya Suriya Rajkumar D, et al.
Published: (2024-12-01)
by: Udaya Suriya Rajkumar D, et al.
Published: (2024-12-01)
Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems
by: Shuming Qiu, et al.
Published: (2018-01-01)
by: Shuming Qiu, et al.
Published: (2018-01-01)
A network security protection scheme for tax system based on elliptic curve cryptography
by: Wenjie Wang, et al.
Published: (2024-12-01)
by: Wenjie Wang, et al.
Published: (2024-12-01)
EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT
by: Manjit Kaur, et al.
Published: (2023-01-01)
by: Manjit Kaur, et al.
Published: (2023-01-01)
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips
by: Zilong Liu, et al.
Published: (2014-09-01)
by: Zilong Liu, et al.
Published: (2014-09-01)
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
by: Sanjay Kumar, et al.
Published: (2023-12-01)
by: Sanjay Kumar, et al.
Published: (2023-12-01)
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
by: Huifang Chen, et al.
Published: (2015-07-01)
by: Huifang Chen, et al.
Published: (2015-07-01)
Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography
by: Biswarup Yogi, et al.
Published: (2025-10-01)
by: Biswarup Yogi, et al.
Published: (2025-10-01)
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
by: Chintan Patel, et al.
Published: (2023-04-01)
by: Chintan Patel, et al.
Published: (2023-04-01)
Similar Items
-
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
by: Jie ZHAO, et al.
Published: (2016-06-01) -
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token
by: Yu-Sheng Yang, et al.
Published: (2023-05-01) -
Elliptic curve cryptography and biometrics for iot authentication
by: Dargaoui Souhayla, et al.
Published: (2025-01-01) -
An Offline Direct Authentication Scheme for the Internet of Medical Things Based on Elliptic Curve Cryptography
by: Asmaa Maarouf, et al.
Published: (2024-01-01) -
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
