نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

2014
S. Udhaya Shree Saleem Basha

Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing tr...

Journal: :IJISP 2009
Lei Chen Wen-Chen Hu Ming Yang Lei Zhang

One of the most popular Internet services is e-mail services which provide sending and receiving electronic messages of communication networks. E-mail standards and services apply various cryptographic algorithms to achieve the security goals (Stallings, 2006; Stallings, 2007) of confidentiality, integrity, authentication and non-repudiation. Data confidentiality in e-mail services is commonly ...

2014
Tayyaba Zeb Abdul Ghafoor Abbasi Muhammad Awais Shibli Muhammad Yousaf

Virtual machine migration is an important tool that can be used in cloud computing environment for load balancing, disaster recovery, server consolidation, hardware maintenance, etc. Currently a few techniques have been proposed to secure the virtual machine migration process. However, these techniques have number of limitations e.g. lack of standard access control, mutual authentication, confi...

Journal: :Security and Communication Networks 2008
Pandurang Kamat Arati Baliga Wade Trappe

Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applications that will run on these networks will require a high degree of security and privacy. In this paper, we present a robust and efficient security framework for vehicular networks suited for both inter-vehicular and vehicle-to-i...

2012
Rama Chandra Rao Ravi Shankar

The services such as electronic commerce, internet privacy, authentication, confidentiality, data integrity and non repudiation are presented by public key cryptosystems. The most popular of public key cryptosystems is RSA cryptosystem. RSA is widely used for digital signature and digital envelope, which provide privacy and authentication. The basic operation of RSA cryptosystem is modular expo...

2014
Apoorva Upadhyay Mahendra Rai

in distributed computing environment, Mobile agents are mobile autonomous processes which operate on behalf of users (e.g., the Internet). These applications include a specialized search of a middleware services such as an active mail system, large free-text database, electronic malls for shopping, and updated networking devices. Mobile agent systems use less network bandwidth, increase asynchr...

2016
D. Sudha Devi K. Thilagavathy Preethi Sai Krishnan

Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant high performance. In this paper we propose an efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol is efficient with redu...

Journal: :CoRR 2014
S. Udhaya Shree M. S. Saleem Basha

Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing tr...

2006
Charles L. Chen Paul S Grisham Sarfraz Khurshid Dewayne E. Perry

We define secure communication to require message integrity, confidentiality, authentication and non-repudiation. This high-level definition forms the basis for many widely accepted definitions of secure communication. In order to understand how security constrains the design of our secure connectors, we have created new logical formulas that define these security properties. Our novel definiti...

2008
Douglas H. Steves Chris Edmondson-Yurkanan Mohamed Gouda

In this paper we deene several properties necessary for electronic commerce. Principal among these are the ACID contractual properties of agreement, causality, isolation, and durability. Although similar to the ACID database transactional properties, our ACID properties are derived more directly from the elements of contract law. Also included are the security properties of privacy , authentica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید