A new secure authentication based distance bounding protocol
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. The distance bounding (DB) protocol was introduced to cater to security requirements. The schemes, howe...
Main Authors: | Ahmed Raheeq Sultan, Imran Rashid, Fawad Khan, Shahzaib Tahir, Maruf Pasha, Aiman Sultan |
---|---|
Format: | Article |
Language: | English |
Published: |
PeerJ Inc.
2021-05-01
|
Series: | PeerJ Computer Science |
Subjects: | |
Online Access: | https://peerj.com/articles/cs-517.pdf |
Similar Items
-
PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM
by: S. Prasanna, et al.
Published: (2014-03-01) -
Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
by: Jui-Di Wu, et al.
Published: (2018-01-01) -
On the Linear Transformation in White-Box Cryptography
by: Seungkwang Lee, et al.
Published: (2020-01-01) -
A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks
by: Tsung-Che Hsieh, et al.
Published: (2020-01-01) -
New approach to practical leakage-resilient public-key cryptography
by: Chakraborty Suvradip, et al.
Published: (2020-07-01)