نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

Journal: :Complex & Intelligent Systems 2021

Abstract Vehicular ad hoc network (VANET) is commonly employed in intelligent transportation system (ITS) that allows the exchange of traffic data among vehicles and nearby environment to accomplish effective driving experience. Privacy security are challenging issues exist safety needs VANET. Any particular leakage vehicle details such as route might result serious impacts, therefore, authenti...

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

Journal: Money and Economy 2013
Asadollah Shahbahrami, Mohsen Ebadi Jokandan,

In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...

2011
Hariharan Krishnan Andre Weimerskirch

In general for Vehicle-to-Vehicle (V2V) communication, message authentication is performed on every received wireless message by conducting verification for a valid signature, and only messages that have been successfully verified are processed further. In V2V safety communication, there are a large number of vehicles and each vehicle transmits safety messages frequently; therefore the number o...

2016
Sumit Chakraborty

This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM i...

2013
Ramana Murthy Srinivasa Rao

Key transfer protocols needs key generation center (KGC) to select and transport session keys to all communication entities secretly, that are mutually trusted. Often, during registration each entity shares a session keys that are encrypted under another secret key by the KGC. In this paper based on secret sharing scheme, we propose an authenticated key transfer protocol that once KGC can broad...

2006
Seog Chung Seo Hyung Chan Kim R. S. Ramakrishna

In this paper, we describe the design and implementation of a new security protocol based on Elliptic Curve Cryptosystems (ECC) for securing Wireless Sensor Networks (WSNs). Some public-key-based protocols such as TinyPK and EccM 2.0 have already been proposed in response. However, they exhibit poor performance. Moreover, they are vulnerable to man-in-the-middle attacks. We propose a cluster-ba...

2011
Rini T Paul

There has been a remarkable increase in the data exchange over web and the widespread use of digital media. The mounting interest with reference to digital watermarking throughout the last decade is certainly due to the increase in the need of copyright protection. Applications of video watermarking in copy control, broadcast monitoring, finger printing, video authentication, copyright protecti...

2015
Neha Roy

In Vehicular Ad hoc Networks (VANETs), vehicles periodically broadcast messages for every 100 to 300 milli seconds. Such messages are used to report a safety or non-safety application. Authentication on such safety messages assures the end users in the network. However, a malicious vehicle can trace the messages and can launch varied types of malicious activity which leads to the compromise of ...

2001
Zoltán Nochta Rainer Ruggaber Taufiq Rochaeli

π is a generic CORBA proxy platform that is used to support applications in mobile and wireless environments. π consists of two proxies which are transparently integrated into the application. Due to the broadcast characteristics of wireless communication, mobile users have very high security requirements. Since the CORBA security service as the standard approach for securing CORBA applications...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید