Thesis (M.S.C.S.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.This paper proposes a novel distributed authentication system that uses robust alternatives in cryptographic algorithms to grant a third-party access to personal data without compromising a user's credentials. The paper examines briefly the concept of distributed authentication systems, and discusses how elliptic curve cryptography and Lamport's hash chain can operate in a zero-...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
In order to construct the border solutions for nonsupersingular elliptic curve equations, some commo...
As two fundamental requirements to ensure secure communications over an insecure public network chan...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
As the Internet of Things (IOT) arises, the use of low-end devices on a daily basis increases. The w...
Abstract The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐de...
In this paper, we cryptanalyze Kim et al.’s scheme and point out several weaknesses in their scheme....
One of the main goals of a cryptographic system is to provide authentication, which simply means pro...
In this paper we propose a secure protocol for authenticated key agreement based on Diffie-Hellman k...
Security of the information is the main problem in network communications nowadays. There is no algo...
To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in m...
Privacy breach has become a major dispute in online transactions. In such a system, users give their...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...
In order to construct the border solutions for nonsupersingular elliptic curve equations, some commo...
As two fundamental requirements to ensure secure communications over an insecure public network chan...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
[[abstract]]Abstract. With the rapid development of wireless communication technologies, mobile netw...
As the Internet of Things (IOT) arises, the use of low-end devices on a daily basis increases. The w...
Abstract The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐de...
In this paper, we cryptanalyze Kim et al.’s scheme and point out several weaknesses in their scheme....
One of the main goals of a cryptographic system is to provide authentication, which simply means pro...
In this paper we propose a secure protocol for authenticated key agreement based on Diffie-Hellman k...
Security of the information is the main problem in network communications nowadays. There is no algo...
To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in m...
Privacy breach has become a major dispute in online transactions. In such a system, users give their...
In recent years, the elliptic curve cryptosystems (ECC) have received attention due to their increas...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices...