Home > Research > Browse

Results for authentication

Publications & Outputs

  1. LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

    Tanveer, M., Abbas, G., Abbas, Z. H., Bilal, M., Mukherjee, A. & Kwak, K. S., 15/02/2022, In: IEEE Internet of Things Journal. 9, 4, p. 2578-2591 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Secure Distribution of Protected Content in Information-Centric Networking

    Bilal, M. & Pack, S., 06/2020, In: IEEE Systems Journal. 14, 2, p. 1921-1932 12 p., 8798748.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Time-assisted authentication protocol

    Bilal, M. & Kang, S. G., 10/2017, In: International Journal of Communication Systems. 30, 15, e3309.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Checksum gestures: continuous gestures as an out-of-band channel for secure pairing

    Ahmed, I., Ye, Y., Bhattacharya, S., Asokan, N., Jacucci, G., Nurmi, P. & Tarkoma, S., 2015, UbiComp '15 Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. New York: ACM, p. 391-401 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Exposing WPA2 security protocol vulnerabilities

    Tsitroulis, A., Lampoudis, D. & Tsekleves, E., 1/01/2014, In: International Journal of Information and Computer Security. 6, 1, p. 93-107 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review