Authentication and Secure Robot Communication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A Novel Architecture for Authentication and Secure Communication in VANET

Authenticate communication model provides secure inter and intra vehicles communication. This architecture uses the concept of distributed database. Every driver has to prove his identity to certified authority to get the communication rights to communicate with other vehicles. Vehicular ad-hoc network for intelligent transport system (ITS) which has become an essential service, provides safety...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

A class of authentication digital watermarks for secure multimedia communication

A new approach to digital signatures for imaging, which adapts well to multimedia communications in lossy channels is introduced. Rather than attaching the signature's bit-string as a file-header, it is invisibly etched into the image using a new watermarking algorithm. The watermark is "nonfragile," tolerating small distortions but not malicious tampering aimed at modifying the image's content...

متن کامل

Secure Authentication through a near Field Communication in Asymmetric Cryptography

This paper presents the design and implementation of a complete near-field communication (NFC) tag system that supports highsecurity features. The tag design contains all hardware modules required for a practical realization, which are: an analog 13.56-MHz radio-frequency identification (RFID) front-end, a digital part that includes a tiny (programmable) 8-b microcontroller, a framing logic for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Robotic Systems

سال: 2014

ISSN: 1729-8814,1729-8814

DOI: 10.5772/57433