A Novel Protocol for Software Authentication
نویسندگان
چکیده
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملMaille Authentication - A Novel Protocol for Distributed Authentication
We present a decentralized solution to the distributed authentication problem. Unlike current schemes, Maille does not rely on a set of dedicated servers. Each participating node has a set of trusted peers that act as replicated repositories for its public key. Whenever a node A wants to contact another node B, it sends messages to its peers, which forward them to their peers, and so on until t...
متن کاملA Novel Stateless Authentication Protocol
The value of authentication protocols which minimise (or even eliminate) the need for stored state in addressing DoS attacks is well-established — the seminal paper of Aura and Nikander [1] is of particular importance in this context. However, although there is now a substantial literature on this topic, it would seem that many aspects of stateless security protocols remain to be explored. In t...
متن کاملA Novel Extensible Authentication Protocol Based Group Authentication and Key Agreement Protocol for Wireless Networking
By utilizing the broadcast nature of radio channels, cooperative wireless communications exploits a brand new degree of freedom to combat unfavorable wireless channel conditions with the help of relays. The transmission reliableness and rates achieved by cooperation for various communication eventualities and cooperation schemes are extensively studied. However, additionally to the benefits it ...
متن کاملA novel certificateless deniable authentication protocol
Deniable authenticated protocol is a new and attractive protocol compared to the traditional authentication protocol. It allows the appointed receiver to identify the source of a given message, but not to prove the identity of the sender to a third party even if the appointed receiver is willing to reveal its private key. In this paper, we first define a security model for certificateless denia...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2010
ISSN: 1812-5638
DOI: 10.3923/itj.2010.395.398