نتایج جستجو برای: authentication and non repudiation
تعداد نتایج: 17010313 فیلتر نتایج به سال:
Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing tr...
One of the most popular Internet services is e-mail services which provide sending and receiving electronic messages of communication networks. E-mail standards and services apply various cryptographic algorithms to achieve the security goals (Stallings, 2006; Stallings, 2007) of confidentiality, integrity, authentication and non-repudiation. Data confidentiality in e-mail services is commonly ...
Virtual machine migration is an important tool that can be used in cloud computing environment for load balancing, disaster recovery, server consolidation, hardware maintenance, etc. Currently a few techniques have been proposed to secure the virtual machine migration process. However, these techniques have number of limitations e.g. lack of standard access control, mutual authentication, confi...
Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applications that will run on these networks will require a high degree of security and privacy. In this paper, we present a robust and efficient security framework for vehicular networks suited for both inter-vehicular and vehicle-to-i...
The services such as electronic commerce, internet privacy, authentication, confidentiality, data integrity and non repudiation are presented by public key cryptosystems. The most popular of public key cryptosystems is RSA cryptosystem. RSA is widely used for digital signature and digital envelope, which provide privacy and authentication. The basic operation of RSA cryptosystem is modular expo...
in distributed computing environment, Mobile agents are mobile autonomous processes which operate on behalf of users (e.g., the Internet). These applications include a specialized search of a middleware services such as an active mail system, large free-text database, electronic malls for shopping, and updated networking devices. Mobile agent systems use less network bandwidth, increase asynchr...
Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant high performance. In this paper we propose an efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol is efficient with redu...
Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing tr...
We define secure communication to require message integrity, confidentiality, authentication and non-repudiation. This high-level definition forms the basis for many widely accepted definitions of secure communication. In order to understand how security constrains the design of our secure connectors, we have created new logical formulas that define these security properties. Our novel definiti...
In this paper we deene several properties necessary for electronic commerce. Principal among these are the ACID contractual properties of agreement, causality, isolation, and durability. Although similar to the ACID database transactional properties, our ACID properties are derived more directly from the elements of contract law. Also included are the security properties of privacy , authentica...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید