نتایج جستجو برای: entity authentication
تعداد نتایج: 185705 فیلتر نتایج به سال:
In a smart city, there are different types of entities, such as nature persons, IoT devices, and service providers, which have computational limitations storage limitations. Unfortunately, all the existing authentication key exchange (AKE) protocols designed for either client–server or client–client authentication, including ones cities. this paper, we present idea compatible (CAKE) protocol pr...
As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security proper...
As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security proper...
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some applications, it might be undesirable in others. Two related notions of authentication are: Deniable Authentication (see Dwork, Naor and Sahai [25]) and Ring Signatures (see Rivest, Shamir and Tauman [38]). In this paper we show how to combine these notions and achie...
4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication syste...
4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a sub network and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication techn...
The ES-LoA project, funded by the UK Joint Information Systems Committee (JISC) under its e-Infrastructure Security Programme, investigates current and future needs among UK research and education community for a more fine-grained access control, which allows service providers to take into account of the levels of confidence in identifying a remote entity requesting for service access. Such a f...
Spontaneous Anonymous Group (SAG) Cryptography studies cryptographic problems in which an entity specifies a group of entites including itself arbitrarily and spontaneously while maintaining its anonymity. There is no Trusted Third Party (TTP) or group manager to get involved. Also, no membership collaboration or any preprocessing is needed.These properties are desirable for many applications r...
Pervasive computing requires some level of trust to be established between entities. In this paper we argue for an entity recognition based approach to building this trust which differs from starting from more traditional authentication methods. We also argue for the concept of a “pluggable” recognition module which allows different recognition schemes to be used in different circumstances. Fin...
A k-Times Anonymous Authentication (k-TAA) scheme allows users to be authenticated anonymously so long as the number of times that they are authenticated is within an allowable number. Some promising applications are e-voting, e-cash, e-coupons, and trial browsing of contents. However, the previous schemes are not efficient in the case where the allowable number k is large, since they require b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید