نتایج جستجو برای: group based handover authentication

تعداد نتایج: 3726165  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده ادبیات و زبانهای خارجی 1391

this study was an attempt to investigate the effect of teaching meta cognitive strategies on iranian intermediate efl students speaking proficiency. in this study the researcher has employed metacognitive strategies taken from brown (2000) to teach speaking strategies to number of participants. the participants were intermediate students of shokouh language institute; they were divided into an ...

Journal: :Computer Communications 2010
Levente Buttyán László Dóra Fabio Martinelli Marinella Petrocchi

In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In order to support mobile users and seamless handover between the access points, the authentication delay has to be reduced. Many proposed fast authentication schemes rely on trust models that are not appropriate in a multi...

Journal: :Wireless Personal Communications 2021

Recently, the Third Generation Partnership Project (3GPP) has initiated research in Fifth (5G) network to fulfill security characteristics of IoT-based services. 3GPP proposed 5G handover key structure and framework a recently published technical report. In this paper, we evaluate authentication mechanisms reported literature identify vulnerabilities such as violation global base-station attack...

Journal: :International journal of Computer Networks & Communications 2018

Journal: :International Journal of Security and Its Applications 2014

Journal: :IEEE Access 2022

Urban air mobility (UAM) is a future transportation system to solve the pollution and movement efficiency problems of traditional system. In UAM environments, unmanned aerial vehicles (UAV) are used transport passengers goods providing various convenient services such as package delivery, bus, taxi. However, UAVs communicate with ground infrastructures through open channels that can be exposed ...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید