Journal articles on the topic 'Lightweight protokol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Lightweight protokol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Prasetyo, Inung Bagus, Mahar Faiqurahman, and Zamah Sari. "Rancang Bangun Control dan Monitoring Sensor Node WSN Menggunakan Protokol Message Queue Telemetry Transport (MQTT)." Jurnal Repositor 2, no. 1 (January 4, 2020): 15. http://dx.doi.org/10.22219/repositor.v2i1.476.
Full textYu, Song Sen, Yun Peng, and Jia Jing Zhang. "A Lightweight RFID Mechanism Design." Advanced Materials Research 216 (March 2011): 120–23. http://dx.doi.org/10.4028/www.scientific.net/amr.216.120.
Full textTsai, Chia-Wei, Chun-Wei Yang, and Narn-Yih Lee. "Lightweight mediated semi-quantum key distribution protocol." Modern Physics Letters A 34, no. 34 (November 5, 2019): 1950281. http://dx.doi.org/10.1142/s021773231950281x.
Full textWu, Yongdong, and Hweehua Pang. "A Lightweight Buyer-Seller Watermarking Protocol." Advances in Multimedia 2008 (2008): 1–7. http://dx.doi.org/10.1155/2008/905065.
Full textSafkhani, Masoumeh, Nasour Bagheri, and Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems." Future Internet 10, no. 9 (August 21, 2018): 82. http://dx.doi.org/10.3390/fi10090082.
Full textOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Full textMansoor, Khwaja, Anwar Ghani, Shehzad Chaudhry, Shahaboddin Shamshirband, Shahbaz Ghayyur, and Amir Mosavi. "Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography." Sensors 19, no. 21 (November 1, 2019): 4752. http://dx.doi.org/10.3390/s19214752.
Full textHe, Hong, Qi Li, and Zhi Hong Zhang. "RFID Security Authentication Protocol Based on Hash for the Lightweight RFID Systems." Applied Mechanics and Materials 380-384 (August 2013): 2831–36. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2831.
Full textChen, Chien-Ming, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, and Hung-Min Sun. "A Secure RFID Authentication Protocol Adopting Error Correction Code." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/704623.
Full textAseeri, Aisha, and Omaimah Bamasag. "Achieving protection against man-in-the-middle attack in HB family protocols implemented in RFID tags." International Journal of Pervasive Computing and Communications 12, no. 3 (September 5, 2016): 375–90. http://dx.doi.org/10.1108/ijpcc-03-2016-0015.
Full textYasser R. Alselehibi, Yasser R. Alselehibi. "Secure Lightweight Routing Scheme for Energy Efficient Wireless Sensor Networks." journal of King Abdulaziz University Computing and Information Technology Sciences 8, no. 2 (March 6, 2019): 57–68. http://dx.doi.org/10.4197/comp.8-2.5.
Full textGódor, Gyozo, and Sándor Imre. "Simple Lightweight Authentication Protocol." International Journal of Business Data Communications and Networking 6, no. 3 (July 2010): 66–94. http://dx.doi.org/10.4018/jbdcn.2010070104.
Full textHou, Yubao, Hua Liang, and Juan Liu. "Super Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operation." International Journal of Mobile Computing and Multimedia Communications 12, no. 1 (January 2021): 63–77. http://dx.doi.org/10.4018/ijmcmc.2021010104.
Full textThammarat, Chalee, and Werasak Kurutach. "A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification." Wireless Communications and Mobile Computing 2018 (July 5, 2018): 1–21. http://dx.doi.org/10.1155/2018/6953160.
Full textRyu, Hyunho, and Hyunsung Kim. "Privacy-Preserving Authentication Protocol for Wireless Body Area Networks in Healthcare Applications." Healthcare 9, no. 9 (August 28, 2021): 1114. http://dx.doi.org/10.3390/healthcare9091114.
Full textLu, Xin Mei, and Lei He. "A Modified Two-Way Authentication Protocol without Server for RFID." Applied Mechanics and Materials 29-32 (August 2010): 2709–13. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2709.
Full text赵, 士琦. "Improved Lightweight Anonymous Authentication Protocol." Advances in Applied Mathematics 09, no. 05 (2020): 759–64. http://dx.doi.org/10.12677/aam.2020.95090.
Full textYu, Ki-soon, Sung-joon Kim, Won-kyu Park, Min-Ho Jang, and Dae-woon Lim. "Implement of Lightweight Security Protocol." Journal of Korean Institute of Communications and Information Sciences 43, no. 4 (April 30, 2018): 723–29. http://dx.doi.org/10.7840/kics.2018.43.4.723.
Full textThammarat, Chalee. "Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol." Symmetry 12, no. 10 (October 9, 2020): 1649. http://dx.doi.org/10.3390/sym12101649.
Full textMartínez-Peláez, Rafael, Homero Toral-Cruz, Jorge R. Parra-Michel, Vicente García, Luis J. Mena, Vanessa G. Félix, and Alberto Ochoa-Brust. "An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances." Sensors 19, no. 9 (May 6, 2019): 2098. http://dx.doi.org/10.3390/s19092098.
Full textHe, Lei, Yong Gan, Na Na Li, and Tao Zhang. "A Revised Serverless Authentication Protocol with Forward Security for RFID." Applied Mechanics and Materials 29-32 (August 2010): 2267–72. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2267.
Full textYu, SungJin, KiSung Park, JoonYoung Lee, YoungHo Park, YoHan Park, SangWoo Lee, and BoHeung Chung. "Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment." Applied Sciences 10, no. 5 (March 4, 2020): 1758. http://dx.doi.org/10.3390/app10051758.
Full textSon, Seunghwan, Yohan Park, and Youngho Park. "A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments." Sustainability 13, no. 16 (August 17, 2021): 9241. http://dx.doi.org/10.3390/su13169241.
Full textKumar, Adarsh, Krishna Gopal, and Alok Aggarwal. "Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things." Journal of Communications Software and Systems 10, no. 3 (March 16, 2017): 179. http://dx.doi.org/10.24138/jcomss.v10i3.122.
Full textDURRESI, ARJAN, VAMSI PARUCHURI, MIMOZA DURRESI, and LEONARD BAROLLI. "CLUSTERING PROTOCOL FOR SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (December 2006): 423–36. http://dx.doi.org/10.1142/s0219265906001788.
Full textMikami, Shugo, Dai Watanabe, Yang Li, and Kazuo Sakiyama. "Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/498610.
Full textHou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.
Full textTaher, Bahaa Hussein, Huiyu Liu, Firas Abedi, Hongwei Lu, Ali A. Yassin, and Alzahraa J. Mohammed. "A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications." Journal of Sensors 2021 (April 27, 2021): 1–18. http://dx.doi.org/10.1155/2021/8871204.
Full textLi, Shu, Xi Yang, and Ping Yuan Liang. "A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers." Applied Mechanics and Materials 303-306 (February 2013): 2112–16. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2112.
Full textRajeswari, S. Raja, and V. Seenivasagam. "Comparative Study on Various Authentication Protocols in Wireless Sensor Networks." Scientific World Journal 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/6854303.
Full textZhang, Xiaowen, Zhanyang Zhang, and Xinzhou Wei. "An Improved Lightweight RFID Authentication Protocol." International Journal of Applied Logistics 2, no. 1 (January 2011): 76–84. http://dx.doi.org/10.4018/ijal.2011010105.
Full textTaresh, Hiba. "PROPOSED LIGHTWEIGHT PROTOCOL FOR IOT AUTHENTICATION." Iraqi Journal for Computers and Informatics 44, no. 1 (June 30, 2018): 18–22. http://dx.doi.org/10.25195/ijci.v44i1.113.
Full textZhang, Xiaowen, Zhanyang Zhang, and Xinzhou Wei. "An Improved Lightweight RFID Authentication Protocol." International Journal of Applied Logistics 2, no. 1 (January 2011): 76–84. http://dx.doi.org/10.4018/jal.2011010105.
Full textXiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (March 2, 2020): 1366. http://dx.doi.org/10.3390/s20051366.
Full textAnuradha, J. A. D. C., Rohan Samarasinghe, and Saluka R. "SecAODV: Lightweight Authentication for AODV Protocol." International Journal of Computer Applications 137, no. 13 (March 17, 2016): 33–38. http://dx.doi.org/10.5120/ijca2016909034.
Full textChen, Chien-Ming, King-Hang Wang, Weicheng Fang, Tsu-Yang Wu, and Eric Ke Wang. "Reconsidering a lightweight anonymous authentication protocol." Journal of the Chinese Institute of Engineers 42, no. 1 (January 2, 2019): 9–14. http://dx.doi.org/10.1080/02533839.2018.1537808.
Full textYang, Ming Hour. "Across-authority lightweight ownership transfer protocol." Electronic Commerce Research and Applications 10, no. 4 (July 2011): 375–83. http://dx.doi.org/10.1016/j.elerap.2011.03.001.
Full textKsiążak, Piotr, William Farrelly, and Kevin Curran. "A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks." International Journal of Information Security and Privacy 8, no. 4 (October 2014): 62–102. http://dx.doi.org/10.4018/ijisp.2014100104.
Full textShi, Zhicai, Xiaomei Zhang, and Jin Liu. "The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security." Wireless Communications and Mobile Computing 2020 (March 18, 2020): 1–12. http://dx.doi.org/10.1155/2020/8436917.
Full textLi, Quanrun, Ching-Fang Hsu, Kim-Kwang Raymond Choo, and Debiao He. "A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks." Security and Communication Networks 2019 (December 4, 2019): 1–13. http://dx.doi.org/10.1155/2019/7871067.
Full textYagoub, Mudathir F. S., Othman O. Khalifa, Abdelzahir Abdelmaboud, Valery Korotaev, Sergei A. Kozlov, and Joel J. P. C. Rodrigues. "Lightweight and Efficient Dynamic Cluster Head Election Routing Protocol for Wireless Sensor Networks." Sensors 21, no. 15 (July 31, 2021): 5206. http://dx.doi.org/10.3390/s21155206.
Full textFang, Lei, Xue Rao, Ling Li, and Huan Li. "A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station." Applied Mechanics and Materials 741 (March 2015): 623–28. http://dx.doi.org/10.4028/www.scientific.net/amm.741.623.
Full textPetrosky, Eric E., Alan J. Michaels, and Joseph M. Ernst. "A Low Power IoT Medium Access Control for Receiver-Assigned CDMA." International Journal of Interdisciplinary Telecommunications and Networking 11, no. 2 (April 2019): 24–41. http://dx.doi.org/10.4018/ijitn.2019040103.
Full textXu, Rui Yang, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu, and Zheng Yan. "Software Defined Intelligent Building." International Journal of Information Security and Privacy 9, no. 3 (July 2015): 84–99. http://dx.doi.org/10.4018/ijisp.2015070105.
Full textZhang, Bing, Zhi Guang Qin, Guo Gen Wan, and Xin Xin Ma. "Design and Analysis of a Low-Cost Mutual Authentication Protocol for RFID." Applied Mechanics and Materials 543-547 (March 2014): 2255–61. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2255.
Full textFan, Kai, Chen Zhang, Kan Yang, Hui Li, and Yintang Yang. "Lightweight NFC Protocol for Privacy Protection in Mobile IoT." Applied Sciences 8, no. 12 (December 5, 2018): 2506. http://dx.doi.org/10.3390/app8122506.
Full textKou, Jiangheng, Mingxing He, Ling Xiong, and Zeqiong Lv. "Efficient Hierarchical Authentication Protocol for Multiserver Architecture." Security and Communication Networks 2020 (March 24, 2020): 1–14. http://dx.doi.org/10.1155/2020/2523834.
Full textKIM, Jin Seok, Kookrae CHO, Dae Hyun YUM, Sung Je HONG, and Pil Joong LEE. "Lightweight Distance Bounding Protocol against Relay Attacks." IEICE Transactions on Information and Systems E95-D, no. 4 (2012): 1155–58. http://dx.doi.org/10.1587/transinf.e95.d.1155.
Full textVenčkauskas, Algimantas, Nerijus Morkevicius, Kazimieras Bagdonas, Robertas Damaševičius, and Rytis Maskeliūnas. "A Lightweight Protocol for Secure Video Streaming." Sensors 18, no. 5 (May 14, 2018): 1554. http://dx.doi.org/10.3390/s18051554.
Full textTian, Yun, Gong Liang Chen, and Jian Hua Li. "A Lightweight Serverless RFID Tag Search Protocol." Advanced Materials Research 684 (April 2013): 531–34. http://dx.doi.org/10.4028/www.scientific.net/amr.684.531.
Full text