نتایج جستجو برای: aka

تعداد نتایج: 1885  

Journal: :IACR Cryptology ePrint Archive 2016
Stéphanie Alt Pierre-Alain Fouque Gilles Macario-Rat Cristina Onete Benjamin Richard

Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms ca...

Journal: :Lecture Notes in Computer Science 2022

The standardized Authentication and Key Agreement protocol for 5G networks (5G AKA) have several security privacy vulnerabilities. In this paper, we propose a novel authentication key agreement beyond that is compatible with the AKA. Our has properties, e.g., perfect forward secrecy, resistance against linkability attacks, protection malicious SNs. Moreover, both user identity secrecy are handl...

Journal: :IACR Cryptology ePrint Archive 2011
Debiao He Jin Hu

Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...

Journal: :Electronics 2022

The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd partnership project (3GPP) includes three cases because it introduces synchronization failure message code (MAC) procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is fully consider...

Journal: :Injury 2011
Jowan G Penn-Barwell

INTRODUCTION Lower limb amputation (LLA) is life-changing surgery. Shorter residual limbs are known to place greater physiological strain on patients than longer residual limbs; however, there is ongoing debate as to whether through-knee amputations are preferable to above-knee amputations. This analysis aims to resolve this question by systematically collecting and pooling published and unpubl...

Journal: :The Journal of Experimental Medicine 1988
S C Wallick E A Kabat S L Morrison

We have observed that antidextran hybridomas with potential N-linked glycosylation sites in VH have higher affinity for polymeric dextran and for isomaltoheptaose than those lacking potential glycosylation sites. In these studies we have used gene transfection and expression techniques to verify that the carbohydrate addition sites in VH were used. The carbohydrate of the VH region was accessib...

2010
Michael Roth Michael Haas

Content Determination (aka Content Selection)

2017
Sven Hungerer Martin Kiechle Christian von Rüden Matthias Militz Knut Beitzel Mario Morgenstern

BACKGROUND After septic failure of total knee arthroplasty (TKA) and multiple revision operations resulting in impaired function, bone and/or soft-tissue damage a reconstruction with a revision arthroplasty might be impossible. Salvage procedures to regain mobility and quality of life are an above-the-knee amputation or knee arthrodesis. The decision process for the patient and surgeon is diffi...

Journal: :Proceedings on Privacy Enhancing Technologies 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید