Author of the publication

PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things.

, , , and . INFOCOM Workshops, page 348-353. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials., , and . IACR Cryptology ePrint Archive, (2010)Improved Impossible Differential Cryptanalysis of 7-Round AES-128., , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 282-291. Springer, (2010)Efficient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries., , and . Wirel. Networks, 25 (8): 4799-4814 (2019)Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors., , and . Int. J. Commun. Syst., 25 (4): 415-426 (2012)Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange., , , and . IEEE Access, (2020)A new lightweight authentication and key agreement protocol for Internet of Things., , and . ISCISC, page 52-59. IEEE, (2016)New authentication/ownership transfer protocol for RFID objects., and . J. Inf. Secur. Appl., (2019)Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce., and . IACR Cryptology ePrint Archive, (2017)Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT., and . IACR Cryptology ePrint Archive, (2018)New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 281-294. Springer, (2009)