The challenge of providing security for Mobile Ad-hoc Networks (MANETs) due to the inherent problems regarding to the use of mobile devices and nonexistence of fixed infrastructures, made them one of the significant topics in security and cryptography research area. In this way, several works have been done to propose lightweight and less energy consuming protocols. However, the use of an expensive cryptographic operation named Bilinear Pairing made the mentioned schemes heavy for such resource constrained environments. In this paper, we could propose an efficient public key authentication scheme over an elliptic curve based algebraic group rather than Bilinear Pairings. The results show that our proposed scheme requires less complex operat...
With the rapid growth of network technologies, users are used to accessing various services with the...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Koblitz and Miller proposed a method by which the group of points on an elliptic curve over a finite...
Due to the resource constrained property of mobile ad hoc networks (MANETs), making their applicatio...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
[[abstract]]The identity (ID)-based public-key system using bilinear pairings defined on elliptic cu...
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from ...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
Abstract—In our scheme, the master key of Mobile Ad Hoc Network (MANET) is generated by all particip...
The authentication key exchange protocol enables communication participants to authenticate each oth...
Due to recent advances in wireless communication, the availability of mobile services has increased ...
We propose an authentication and key agreement protocol for wireless communication based on elliptic...
With the rapid growth of network technologies, users are used to accessing various services with the...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Koblitz and Miller proposed a method by which the group of points on an elliptic curve over a finite...
Due to the resource constrained property of mobile ad hoc networks (MANETs), making their applicatio...
[[abstract]]Considering the low-power computing capability of mobile devices, the security scheme de...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
[[abstract]]The identity (ID)-based public-key system using bilinear pairings defined on elliptic cu...
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from ...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
Abstract—In our scheme, the master key of Mobile Ad Hoc Network (MANET) is generated by all particip...
The authentication key exchange protocol enables communication participants to authenticate each oth...
Due to recent advances in wireless communication, the availability of mobile services has increased ...
We propose an authentication and key agreement protocol for wireless communication based on elliptic...
With the rapid growth of network technologies, users are used to accessing various services with the...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Koblitz and Miller proposed a method by which the group of points on an elliptic curve over a finite...