An efficient authentication and key agreement scheme for e-health applications in the context of Internet of ThingsAuthentication and Key Agreement Scheme • June 22nd, 2020
Contract Type FiledJune 22nd, 2020Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane. An efficient authentication and key agree- ment scheme for e-health applications in the context of Internet of Things. International Journal of Information and Computer Security, 2019, 11 (3), pp.1. 10.1504/IJICS.2019.10018795 . hal- 02411302
Authentication And Key Agreement Based On Anonymous Identity For Peer-To-Peer CloudAuthentication and Key Agreement Scheme • July 22nd, 2022
Contract Type FiledJuly 22nd, 2022Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the original cloud servers to their mobile phones in order to further upload the downloaded data to the new cloud provider. To solve this problem, we propose an efficient data migration model between cloud providers and construct a mutual authentication and key agreement scheme based on elliptic curve certificate-free cryptography for peer-to peer cloud. The proposed scheme helps to develop trust between different cloud providers and lays a foundation for the realization of cross-cloud data migration. Mathematical verification and security correctness of our scheme is evaluated against notable existing schemes of data migration, which demonstrate that o
A novel remote user authentication and key agreement scheme for mobile client- server environmentAuthentication and Key Agreement Scheme • March 26th, 2013
Contract Type FiledMarch 26th, 2013of k. To compute k, the adversary must know s or (sC, xC). However, without s and (sC, xC), computing k from Ppub and PKC − XC is as hard as solving the CDH problem. Therefore, Theorem 7 holds.
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer CloudAuthentication and Key Agreement Scheme • April 23rd, 2022
Contract Type FiledApril 23rd, 2022
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer CloudAuthentication and Key Agreement Scheme • April 16th, 2020
Contract Type FiledApril 16th, 2020Abstract—Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the original cloud servers to their mobile phones in order to further upload the downloaded data to the new cloud provider. To solve this problem, we propose an efficient data migration model between cloud providers and construct a mutual authentication and key agreement scheme based on elliptic curve certificate-free cryptography for peer-to- peer cloud. The proposed scheme helps to develop trust between different cloud providers and lays a foundation for the realization of cross-cloud data migration. Mathematical verification and security correctness of our scheme is evaluated against notable existing schemes of data migration, which demonstr