The security of cryptographic schemes is proven secure by reducing an attacker which breaks the scheme to an algorithm that could be used to solve the underlying hard assumption (e.g., Discrete Logarithm, Decisional Diffie–Hellman). The reduction is considered tight if it results in approximately similar probability bounds to that of solving the underlying hard assumption. Tight security is desirable as it improves security guarantees and allows the use of shorter parameters without the risk of compromising security. In this work, we propose an identity-based identification (IBI) scheme with tight security based on a variant of the Schnorr signature scheme known as TNC signatures. The proposed IBI scheme enjoys shorter parameters and key si...
The area of security for heterogeneous sensor networks (HSNs) is still an open research field that r...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
A smart-card-based user authentication scheme for wireless sensor networks (hereafter re-ferred to a...
The security of cryptographic schemes is proven secure by reducing an attacker which breaks the sche...
Most identity-based identification (IBI) schemes proposed in recent literature are built using pairi...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
Sensor networks are ad-hoc mobile networks that include sensor nodes with limited computational and ...
Abstract: Since the multi-user broadcast authentication protocol in current WSN cannot provide stron...
Abstract. We present a batch version of Schnorr’s identification scheme. Our scheme uses higher degr...
Identification schemes are cryptographic primitives that enable strong authentication for access con...
Authentication is an important aspect for security in any cryptographic application. For Wireless Se...
Abstract- Wireless sensor networks (WSN) are usually deployed in hostile environments, which having ...
Data security is one of the issues during data exchange between two sensor nodes in wireless sensor ...
There are many applications of wireless sensor networks (WSNs) we are using now a days and security ...
The area of security for heterogeneous sensor networks (HSNs) is still an open research field that r...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
A smart-card-based user authentication scheme for wireless sensor networks (hereafter re-ferred to a...
The security of cryptographic schemes is proven secure by reducing an attacker which breaks the sche...
Most identity-based identification (IBI) schemes proposed in recent literature are built using pairi...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
Sensor networks are ad-hoc mobile networks that include sensor nodes with limited computational and ...
Abstract: Since the multi-user broadcast authentication protocol in current WSN cannot provide stron...
Abstract. We present a batch version of Schnorr’s identification scheme. Our scheme uses higher degr...
Identification schemes are cryptographic primitives that enable strong authentication for access con...
Authentication is an important aspect for security in any cryptographic application. For Wireless Se...
Abstract- Wireless sensor networks (WSN) are usually deployed in hostile environments, which having ...
Data security is one of the issues during data exchange between two sensor nodes in wireless sensor ...
There are many applications of wireless sensor networks (WSNs) we are using now a days and security ...
The area of security for heterogeneous sensor networks (HSNs) is still an open research field that r...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
A smart-card-based user authentication scheme for wireless sensor networks (hereafter re-ferred to a...