Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Chukhu Chunka"'
Publikováno v:
Concurrency and Computation: Practice and Experience. 35
Publikováno v:
Journal of The Institution of Engineers (India): Series B. 103:329-340
To perform the secure communication over the insecure channel, Key Agreement Protocol is a prominent approach to generate the session key between the communication parties. Since the last two decades, researchers came up with various ideas to design
An Efficient Mutual Authentication and Symmetric Key Agreement Scheme for Wireless Body Area Network
Autor:
Chukhu Chunka, Subhasish Banerjee
Publikováno v:
Arabian Journal for Science and Engineering. 46:8457-8473
A Wireless Body Area Networks (WBANs) is a wireless network in which sensors are embedded inside the body of a human, to monitor the health of patient continuously without any constraint in his normal daily life activities. As the information from th
Publikováno v:
Wireless Personal Communications. 117:1361-1385
Securely accessing the information from sensor nodes is the premier need and becomes the challenging area in wireless sensor networks (WSNs) and internet of things environment (IoT). Consequently, keeping up the protection of shared information, auth
Autor:
Chukhu Chunka
Publikováno v:
International Journal of Engineering and Advanced Technology. 9:4384-4389
The purpose of information security is to protect information or data from misuse, unauthorized access and also to ensure the secured communication between transmitter and receiver. In this regard, one of the primary and foremost necessity is to prot
Publikováno v:
Wireless Personal Communications. 107:243-270
Over the last two?decades, several researchers have recommended many remote user authentication schemes, following since introducing the concept way back in 1981. Researchers are continuously trying to enhance the security in authentication protocols
Publikováno v:
International Journal of Security and Its Applications. 11:61-70
Publikováno v:
Micro-Electronics and Telecommunication Engineering ISBN: 9789811523281
Idea behind the key agreement protocol is to enable the entities to communicate safely over insecure public networks. In this paper, we proposed a secure key agreement protocol using Diffie-Hellman key agreement. In 2005, Lee and Lee [1] proposed a k
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e17f26115b990f294da48e9446596a29
https://doi.org/10.1007/978-981-15-2329-8_54
https://doi.org/10.1007/978-981-15-2329-8_54
Publikováno v:
ANTS
The major objectives of the computer networks are, sharing information and providing uninterrupted services over a distance. Because of the critical nature of computer networks and continuous development in information technology, the probability of
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811319501
Purpose of computer network is to share the information and provide the secure services. Due to publically in nature of computer network opens the possibility of hacking and stealing the confidential information by the attackers. To maintain confiden
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c542de66ef8f032c1ffa5f557e0bd524
https://doi.org/10.1007/978-981-13-1951-8_64
https://doi.org/10.1007/978-981-13-1951-8_64