Please use this identifier to cite or link to this item: https://repository.seku.ac.ke/handle/123456789/5120
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLi, Fagen-
dc.contributor.authorHong, Jiaojiao-
dc.contributor.authorOmala, Anyembe A.-
dc.date.accessioned2019-10-25T08:35:29Z-
dc.date.available2019-10-25T08:35:29Z-
dc.date.issued2018-01-
dc.identifier.citationWireless Networks, Volume 24, Issue 1, pp 139–149 January 2018en_US
dc.identifier.issn1022-0038-
dc.identifier.urihttps://link.springer.com/article/10.1007/s11276-016-1317-9-
dc.identifier.urihttp://repository.seku.ac.ke/handle/123456789/5120-
dc.descriptionDOI: 10.1007/s11276-016-1317-9en_US
dc.description.abstractPervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two heterogeneous deniable authentication protocols for pervasive computing environments using bilinear pairings. The first protocol allows a sender in a public key infrastructure (PKI) environment to send a message to a receiver in an identity-based cryptography (IBC) environment. The second protocol allows a sender in the IBC environment to send a message to a receiver in the PKI environment. Our protocols admits formal security proof in the random oracle model under the bilinear Diffie–Hellman assumption. In addition, our protocols support batch verification that can speed up the verification of authenticators. The characteristic makes our protocols useful in pervasive computing environments.en_US
dc.language.isoenen_US
dc.publisherSpringer Verlagen_US
dc.subjectPervasive computingen_US
dc.subjectSecurityen_US
dc.subjectAuthenticationen_US
dc.subjectDeniable authenticationen_US
dc.subjectHeterogeneityen_US
dc.titlePractical deniable authentication for pervasive computing environmentsen_US
dc.typeArticleen_US
Appears in Collections:School of Science and Computing (JA)

Files in This Item:
File Description SizeFormat 
Li_Practical deniable authentication for pervasive....pdfAbstract67.1 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.