Quantum-resistance authentication in centralized cognitive radio networks
Abstract
References
- Quantum-resistance authentication in centralized cognitive radio networks
Recommendations
A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services
Lately, many of developed countries that have healthcares services use telecare medicine information systems (TMIS). In TMIS, a patient can obtain sorts of healthcare delivery services. Furthermore, physicians and also caregivers can check vital signs ...
An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment
The smart card based password authentication scheme is one of the most important and efficient security mechanism, which is used for providing security to authorized users over an insecure network. In this paper, we analyzed major security flaws of ...
An ID-based Non-Interactive Deniable Authentication Protocol based on ECC
ICCNS '17: Proceedings of the 2017 7th International Conference on Communication and Network SecurityDeniable authentication is an important security aspect for achieving authentication and privacy. The goal is to allow an intended receiver to identify the origin of a given message without being able to prove sender's identity to a third party. In this ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
John Wiley & Sons, Inc.
United States
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0