نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

2016
Jong J. Lee Youn-Sik Hong Ki Young Lee

Authentication is a communication protocol processing procedure. In the Internet of Things, secure communication should be constructed between one "thing" and another by such a procedure. The identity that the second "thing" or object claims should be consistent with what the first one claims. Claimed identity information becomes a single message. Based on this message, we verify the identity o...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

Journal: :IACR Cryptology ePrint Archive 2009
Zhijun Li Guang Gong Zhiguang Qin

The simple, computationally efficient LPN-based HB-like entity authentication protocols have attracted a great deal of attention in the past few years due to the broad application prospect in low-cost pervasive devices. At present, the most efficient protocol is HB, which is proven to resist the GRS attack under the conjecture that it is secure in the DET-model. In this paper, we introduce an i...

2013
K.AnithaKumari G.SudhaSadasivam

Most of the familiar protocols use single server for storing all the needed information to authenticate a user. Maintenance of security is of primary importance in any computing environment. Safe and effective authentication mechanism and evaluation methods of the entity are of utmost importance for the grid users to facilitate legitimate utilization of resources. It improves the legal user's c...

Journal: :Journal of Computer Security 2012
David A. Basin Cas J. F. Cremers Simon Meier

We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some that violate even the most basic authentication guarantees. We analyse the cause of these weaknesses, propose repaired versions of the protocols, and provide automated, machinechecked proofs of the correctness of the resulting prot...

1997
Simon Blake-Wilson Alfred Menezes

This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport. A formal model is provided, and a deenition of the goals within this model is supplied. Two protocols are presented and proven secure within this framework, given the existence of certain cryptographic primitives. The ...

2014
Jeroen Delvaux Dawu Gu Dries Schellekens Ingrid Verbauwhede

Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC ‘fingerprint’. Therefore, they have been envisioned as an IC authentication mechanism, in particular for the subclass of so-called strong PUFs. The protocol proposals are typically accompanied with two PUF promises: lightweight ...

Journal: Money and Economy 2013
Asadollah Shahbahrami, Mohsen Ebadi Jokandan,

In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...

Journal: :CIT 2009
Balint Molnar Andrea Ko

Processes that are related to the identification and the authentication of persons and other legal entities have been necessarily existing and functioning for a while in public administration and business. Information Society offers new e-services for citizens and businesses, which dramatically change the administration and results in additional challenges, risks and opportunities. Citizen’s co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید