نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

2003
T. Newe Tom Coffey

Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in current work environments. A number of new protocols have been recently published with the goal of providing both privacy of data and authentication of users for mobile systems. Such protocols can employ private-key and...

2004
Dae-Hee Seo Im-Yeong Lee Soo-Young Chae Choon-Soo Kim

Absnnct-The rapid expansion of the Internet has provided users with a diverse range of semces. Most Internet users create many different IDS and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and nsers manage a number of I D S . The SSO system eau...

2003
Jose Antonio Onieva Jianying Zhou Mildrey Carbonell Castro Javier López

In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In this paper, we introduce the concept of intermediary (or agent) in a non-repudiation protocol, define the aims of intermediary non-repudiation protocols, and analyze their security requirements. We present a simple scena...

2007
Paul S Grisham Charles L. Chen Sarfraz Khurshid Dewayne E. Perry

We define secure communication to require message integrity, confidentiality, authentication and non-repudiation. This high-level definition forms the basis for many widely accepted definitions of secure communication. In order to understand how security constrains the design of our secure connectors, we have created new logical formulas that define these security properties. Our novel definiti...

Journal: :IEEE Access 2022

In the Internet of Battlefield Things (IoBT), users and sensor-equipped entities send multiple messages to Command Control Center (CCC) over network. The authentication integrity these are crucial because if an adversary or malicious node transmits, alters, replays messages, consequences will be disasters. Current centralized systems not suitable for distributed environment such schemes prone a...

2008
Francis Klay Laurent Vigneron

Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing...

پایان نامه :0 1392

nowadays in trade and economic issues, prediction is proposed as the most important branch of science. existence of effective variables, caused various sectors of the economic and business executives to prefer having mechanisms which can be used in their decisions. in recent years, several advances have led to various challenges in the science of forecasting. economical managers in various fi...

2010
Hamdi Eltaief Habib Youssef

One of the main issues in securing multicast communication is the source authentication service. In this work we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead, computing efficiency and robustness against packet loss are important parameters to b...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

simplification universal as a universal feature of translation means translated texts tend to use simpler language than original texts in the same language and it can be critically investigated through common concepts: type/token ratio, lexical density, and mean sentence length. although steps have been taken to test this hypothesis in various text types in different linguistic communities, in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید