χperbp: a cloud-based lightweight mutual authentication protocol (English)
- New search for: Adeli, Morteza
- New search for: Bagheri, Nasour
- New search for: Sadeghi, Sadegh
- New search for: Kumari, Saru
- New search for: Adeli, Morteza
- New search for: Bagheri, Nasour
- New search for: Sadeghi, Sadegh
- New search for: Kumari, Saru
In:
Peer-to-Peer Networking and Applications
;
16
, 4
;
1785-1802
;
2023
- Article (Journal) / Electronic Resource
-
Title:χperbp: a cloud-based lightweight mutual authentication protocol
-
Additional title:Peer-to-Peer Netw. Appl.
-
Contributors:Adeli, Morteza ( author ) / Bagheri, Nasour ( author ) / Sadeghi, Sadegh ( author ) / Kumari, Saru ( author )
-
Published in:Peer-to-Peer Networking and Applications ; 16, 4 ; 1785-1802
-
Publisher:
- New search for: Springer US
-
Place of publication:New York
-
Publication date:2023-08-01
-
Size:18 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 16, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1583
-
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless NetworksChen, Du / Gao, Deyun / Jin, Lu / Quan, Wei / Zhang, Hongke et al. | 2023
- 1596
-
LoRa network communication protocol based on location and time planningXuewen, He / Kaihua, Cao et al. | 2023
- 1609
-
A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSNRayar, Vijay / Naik, Udaykumar / Manage, Prabhakar S. et al. | 2023
- 1624
-
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNsBourebia, Nour El Houda / Li, Chunlin et al. | 2023
- 1641
-
Integrating the edge intelligence technology into image composition: A case studyYuan, Peiyan / Han, Zhao / Zhao, Xiaoyan et al. | 2023
- 1652
-
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistanceLi, Tao / Liu, Yali / Ning, Jianting et al. | 2023
- 1668
-
Joint task assignment and path planning for truck and drones in mobile crowdsensingWang, Zijia / Zhang, Baoxian / Xiang, Yangxia / Li, Cheng et al. | 2023
- 1680
-
Anomaly traffic detection based on feature fluctuation for secure industrial internet of thingsYin, Jie / Zhang, Chuntang / Xie, Wenwei / Liang, Guangjun / Zhang, Lanping / Gui, Guan et al. | 2023
- 1696
-
A composite blockchain associated event traceability method for financial activitiesWang, Junlu / Li, Su / Wanting, Ji / Li, Dong / Song, Baoyan et al. | 2023
- 1716
-
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud systemDuan, Shengchen / Liu, Hong / Gu, Lize et al. | 2023
- 1739
-
Quality of service aware routing in software defined video streaming: a surveyParamasivam, Suguna / Leela Velusamy, R et al. | 2023
- 1761
-
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANETMonisha, A. Anu / Reshmi, T. R. / Murugan, K. et al. | 2023
- 1785
-
χperbp: a cloud-based lightweight mutual authentication protocolAdeli, Morteza / Bagheri, Nasour / Sadeghi, Sadegh / Kumari, Saru et al. | 2023
- 1803
-
Parked vehicles crowdsourcing for task offloading in vehicular edge computingZeng, Feng / Rou, Ranran / Deng, Qi / Wu, Jinsong et al. | 2023
- 1819
-
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor networkSarath Kumar, R. / Sampath, P. / Ramkumar, M et al. | 2023
- 1834
-
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKsHu, Xiaoyan / Zhou, Weicheng / Yin, Jun / Cheng, Guang / Yan, Shen / Wu, Hua et al. | 2023
- 1852
-
A blockchain-based cyber-security for connected networkschoudhary, Deepak / Pahuja, Roop et al. | 2023
- 1868
-
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETsBhabani, Bidisha / Mahapatro, Judhistir et al. | 2023
- 1887
-
IoT intrusion detection model based on gated recurrent unit and residual networkZhao, Guosheng / Ren, Cai / Wang, Jian / Huang, Yuyan / Chen, Huan et al. | 2023
- 1900
-
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of thingsEbrahimpour, Elham / Babaie, Shahram et al. | 2023
- 1916
-
Bit flipping attack detection in low power wide area networks using a deep learning approachAlizadeh, Faezeh / Bidgoly, Amir Jalaly et al. | 2023
- 1927
-
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chainYu, Bei / Feng, Libo / Zhu, Hongyu / Qiu, Fei / Wan, Ji / Yao, Shaowen et al. | 2023
- 1944
-
A task allocation method based on data fusion of multimodal trajectory in mobile crowd sensingLiu, Jia / Wang, Jian / Yan, Yuping / Zhao, Guosheng et al. | 2023
- 1959
-
An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimizationSamiayya, Duraimurugan / Radhika, S. / Chandrasekar, A. et al. | 2023
- 1975
-
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare SystemKumar Chaudhary, Ravi Raushan / Chatterjee, Kakali et al. | 2023
- 1993
-
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimizationSivamohan, S. / Sridhar, S. S. / Krishnaveni, S. et al. | 2023