The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a condition-based location authentication protocol for mobile devices to authenticate users' location claims. This protocol collaborates with other neighboring mobile devices to generate the trusted proofs. This protocol does not require any extra equipment built in mobile devices, thus, it is easy to use and deploy. Through the security analysis, our protocol is more secure...
Recently, Guo et al. proposed a chaotic maps based mutual authentication and key agreement protocol using smart cards for wireless communications. In this paper, we demonstrate that this protocol does not possess the security of session key. To overcome their security weakness, we propose an improved chaotic maps-based mutual authentication and key agreement scheme with the same conditions.
Considering the low-power computing capability of mobile devices, the security scheme design is a nontrivial challenge. The identity (ID)-based public-key system with bilinear pairings defined on elliptic curves offers a flexible approach to achieve simplifying the certificate management. In the past, many user authentication schemes with bilinear pairings have been proposed. In 2009, Goriparthi et...
With the development of WSNs in the military and commercial fields, the security of WSNs is becoming more and more important. The security threats of wireless sensor networks (WSNs) come from not only the attacks of external attackers but also the byzantine behaviors and selfish behaviors of internal nodes. The classical security mechanisms, namely cryptography and authentication, can prevent some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.