نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

2012
Anthony Van Herrewege Stefan Katzenbeisser Roel Maes Roel Peeters Ahmad-Reza Sadeghi Ingrid Verbauwhede Christian Wachsmann

RFID-based tokens are increasingly used in electronic payment and ticketing systems for mutual authentication of tickets and terminals. These systems typically use cost-effective tokens without expensive hardware protection mechanisms and are exposed to hardware attacks that copy and maliciously modify tokens. Physically Unclonable Functions (PUFs) are a promising technology to protect against ...

Journal: :Int. J. Comput. Math. 2008
Rongxing Lu Xiaodong Lin Zhenfu Cao Liuquan Qin Xiaohui Liang

Deniable authentication protocol is a new authentication mechanism in secure computer communication, which not only enables an intended receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. In this paper, based on the Diffie-Hellman algorithm, we propose a new simple deniable authentication protocol from a provably secu...

2015
Zuowen Tan Z. W. Tan

In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...

Journal: :Soft Computing 2021

Abstract PUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs one of emerging focuses. For PUF-based mutual authentication protocols, method to abstract properties by using logic events proposed, application aspects are extended protocols based security. With interaction protocol formally described events, basic sequences constructed strong property ...

2015
Atul Chaturvedi Neelam Srivastava Varun Shukla S. P. Tripathi Manoj Kumar Misra D. Balfanz D. K. Smetters P. Stewart

Entity authentication and key distribution are very important cryptographic problems in mobile communication or in ad-hoc networks or in wireless communication at large. Mutual entity authentication is seen as the necessary process to the establishment of a secure and authentic connection. For a reliable secure communication, mutual entity authentication is very often seen as the necessity to t...

Journal: :I. J. Network Security 2016
Ahmed Asimi Younes Asimi Abdellah Amghar Yassine Sadqi

Currently, the security of the users’ privacy in public spaces has more concerns especially in web applications. Also, the unconsciousness of users by the importance of the quality cryptographic of these authentication parameters makes their commoditized accounts. Hence, investment in the computer discipline becomes more demanding to prevent potential attacks. In this paper, we introduce a new ...

2013
Alexandru Gavril Bardas

The username/password paradigm is a well-known authentication mechanism. Probably the most common version in use is the password authentication via an HTML form. The user has to type his/her password directly into a web page from the site to which he/she wishes to authenticate himself/herself. The problem with using this approach is that it relies on the user to determine when it is safe to ent...

Journal: :EURASIP J. Wireless Comm. and Networking 2007
Byung-Rae Lee

The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual aut...

Journal: :IJEBM 2012
An-Ta Liu Henry Ker-Chang Chang Yuan-Shiang Lo Shen-Yi Wang

In recent years, the privacy is very important for the supply chain management, since the privacy of a people can not be followed when their embedded information are kept secretly. This is the reason why the RFID system has became increasingly sophisticated and has resulted to many more applications. However, the existence of some RFID privacy and security issues still need to be resolved. In t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید