نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

Journal: :Symmetry 2021

In a smart city, there are different types of entities, such as nature persons, IoT devices, and service providers, which have computational limitations storage limitations. Unfortunately, all the existing authentication key exchange (AKE) protocols designed for either client–server or client–client authentication, including ones cities. this paper, we present idea compatible (CAKE) protocol pr...

Journal: :Electr. Notes Theor. Comput. Sci. 2010
Dusko Pavlovic Catherine A. Meadows

As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security proper...

Journal: :CoRR 2009
Dusko Pavlovic Catherine A. Meadows

As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security proper...

2002
Moni Naor

Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some applications, it might be undesirable in others. Two related notions of authentication are: Deniable Authentication (see Dwork, Naor and Sahai [25]) and Ring Signatures (see Rivest, Shamir and Tauman [38]). In this paper we show how to combine these notions and achie...

2015
Pijush Kanti Bhattacharjee Sudipta Roy Rajat Kumar Pal

4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication syste...

2015
Pijush Kanti Bhattacharjee Rajat Kumar Pal

4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication techn...

2007
Aleksandra Nenadić Ning Zhang

The ES-LoA project, funded by the UK Joint Information Systems Committee (JISC) under its e-Infrastructure Security Programme, investigates current and future needs among UK research and education community for a more fine-grained access control, which allows service providers to take into account of the levels of confidence in identifying a remote entity requesting for service access. Such a f...

2003
Fung Kar Yin Victor K. Wei

Spontaneous Anonymous Group (SAG) Cryptography studies cryptographic problems in which an entity specifies a group of entites including itself arbitrarily and spontaneously while maintaining its anonymity. There is no Trusted Third Party (TTP) or group manager to get involved. Also, no membership collaboration or any preprocessing is needed.These properties are desirable for many applications r...

2003
Jean-Marc Seigneur Stephen Farrell Christian Damsgaard Jensen Elizabeth Gray Yong Chen

Pervasive computing requires some level of trust to be established between entities. In this paper we argue for an entity recognition based approach to building this trust which differs from starting from more traditional authentication methods. We also argue for the concept of a “pluggable” recognition module which allows different recognition schemes to be used in different circumstances. Fin...

2006
Isamu Teranishi Kazue Sako

A k-Times Anonymous Authentication (k-TAA) scheme allows users to be authenticated anonymously so long as the number of times that they are authenticated is within an allowable number. Some promising applications are e-voting, e-cash, e-coupons, and trial browsing of contents. However, the previous schemes are not efficient in the case where the allowable number k is large, since they require b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید