نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

Journal: :Digital threats 2022

The service of authentication constitutes the spine all security properties. It is phase where entities prove their identities to each other and generally establish derive cryptographic keys provide confidentiality, data integrity, non-repudiation, availability. Due heterogeneity particular requirements IoT (Internet Things), developing secure, low-cost, lightweight protocols has become a serio...

Journal: :World Electric Vehicle Journal 2023

Secure communication between connected electric vehicles is critical for realizing the full potential of Internet Vehicles. However, authentication and security information shared remains a major challenge. In this work, we propose blockchain-based data algorithm to enable secure sharing vehicles. Our leverages distributed ledger consensus mechanism blockchain technology overcome limitations tr...

Journal: :Computer Communications 2002
Steve Kremer Olivier Markowitch Jianying Zhou

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a fair non-repudiation protocol has to...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

1999
C.-C. Liew Wee Keong Ng Ee-Peng Lim B.-S. Tan Kok-Leong Ong

Abecos is an agent-based e-commerce system under development at the Nanyang Technological University. A key factor in making this system usable in practice is strict security controls. One aspect of security is the provision of non-repudiation services. As protocols for non-repudiation have focused on -message non-repudiation, its adaptation to a ord non-repudiation in a communication session f...

2008
Ahren Studer Fan Bai Bhargav Bellur Adrian Perrig

The authentication of VANET messages continues to be an important research challenge. Although much research has been conducted in the area of message authentication in wireless networks, VANETs pose unique challenges, such as real-time constraints, processing limitations, memory constraints, requirements for interoperability with existing standards, extensibility and flexibility for future req...

Journal: :Computer Communications 2004
Jose Antonio Onieva Jianying Zhou Javier López

Non-repudiation is a security service that provides cryptographic evidence to support the settlement of disputes. In this paper, we introduce the state-of-the-art of non-repudiation protocols for multiple entities. We extend an existing multi-party non-repudiation (MPNR) protocol to allow an originator to send different messages to many recipients in a single transaction. We further propose an ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1392

this research has been taken among the students of high school in karaj city during the years 1391 and 1392. this is a survey research and data gathering is through questionnaires. studying the “an analysis of students’ tendency toward non-native reference groups in karaj”. the questionnaire was distributed among 260 of these students who were chosen through multi step cluster sampling. conside...

Journal: :CoRR 2009
Mohsen Toorani Asghar Beheshti

An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the traditional signaturethen-encryption schemes. It simultaneously provides the attributes of message confidentiality, authentication, integrity, unforgeabi...

1999
J. Zhou K. Y. Lam

Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable dispute resolution. To be eligible as non-repudiation evidence, the digital signature on an electronic document should remain valid until its expiry date which is specified by some non-repudiation policy. The conventio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید