نتایج جستجو برای: group based handover authentication
تعداد نتایج: 3726165 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
this study was an attempt to investigate the effect of teaching meta cognitive strategies on iranian intermediate efl students speaking proficiency. in this study the researcher has employed metacognitive strategies taken from brown (2000) to teach speaking strategies to number of participants. the participants were intermediate students of shokouh language institute; they were divided into an ...
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In order to support mobile users and seamless handover between the access points, the authentication delay has to be reduced. Many proposed fast authentication schemes rely on trust models that are not appropriate in a multi...
Recently, the Third Generation Partnership Project (3GPP) has initiated research in Fifth (5G) network to fulfill security characteristics of IoT-based services. 3GPP proposed 5G handover key structure and framework a recently published technical report. In this paper, we evaluate authentication mechanisms reported literature identify vulnerabilities such as violation global base-station attack...
Urban air mobility (UAM) is a future transportation system to solve the pollution and movement efficiency problems of traditional system. In UAM environments, unmanned aerial vehicles (UAV) are used transport passengers goods providing various convenient services such as package delivery, bus, taxi. However, UAVs communicate with ground infrastructures through open channels that can be exposed ...
as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید