نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

1992
Birgit Pfitzmann Michael Waidner

We present the first Byzantine agreement protocol which tolerates any number of maliciously faulty processors without relying on computational assumptions (such as the unforgeability of digital signatures). Our protocol needs reliable broadcast and secret channels in a precomputation phase. For a security parameter σ, it achieves Byzantine agreement with an error probability of at most 2–σ, whe...

Broadcast digitalization with its enormous benefits to the broadcasting industry will improve the quality of content of programs delivered by television stations. Africa has a switchover date of June, 2017. For Nigerians to have access to television broadcast once the switch over is completed, they must purchase high definition television sets or the set-up box. The awareness among urban dwelle...

2009
Rex Chen Amelia Regan

VANET based information systems have considerable promise for improving traffic safety, reducing congestion and increasing environmental efficiency of transportation systems. However, the potential of these systems will not be realized until the issue of network security is fully resolved. In this paper, we introduce a security scheme called Temporary Authentication and Revocation Indicator for...

2010
Reddi Siva Ranjani Dhavala Lalitha Bhaskari Peri S. Avadhani

Lei et al. [26] proposed a new asymmetric group key agreement protocol allowing a set of users to negotiate a common encryption key accessible by any user, and each user holds her respective decryption key. This enables the confidential message communication among group users, and grants any outsider to send message to the group. In this paper, an authenticated asymmetric group key agreement pr...

2015
Seonho Choi Hyeonsang Eom

Attacks against broadcast services in wireless sensor networks will have the most catastrophic effects on power and other resource consumptions. As bogus broadcast packets are propagated through sensor nodes without being filtered out, sensor nodes will waste their resources such as power and memory on transmitting and buffering those false packets. In networks where complex Denial-ofService (D...

Journal: :J. Mathematical Cryptology 2008
Ryoh Fuji-Hara Xiyang Li Ying Miao Dianhua Wu

A (k, n;w) multi-receiver multi-message authentication code allows a transmitter to broadcast up to w − 1 different authenticated messages to n receivers in such a way that (1) not only an opponent but also any up to k − 1 receivers cannot cheat any other receivers, and (2) all the receivers can independently verify the authenticity of the messages. Obana and Kurosawa (Designs, Codes and Crypto...

2013
Xiang Gao

Due to practical demands, usability in security systems is reconsidered by researchers in recent years. Given the three prevailing short range communication technologies Radio Frequency Identification (RFID), Near Field Communication (NFC) and Bluetooth, Zero-Interaction Authentication (ZIA) is proposed for a subset of their application scenarios. Nevertheless, relay attacks especially ”ghost-a...

2014
Ying Wang Xinguang Peng Jing Bian

Since the multi-user broadcast authentication protocol in current WSN cannot provide strong safety, perfect scalability and low energy consumption simultaneously. A certificateless key managing scheme based on identity is studied in this paper. The proposed method divides the broadcasting in WSN into two parts: users broadcasting and base station broadcasting. We also adopt different password s...

2017

Today, everything has been digitized and Banking is one of the sectors which faces online threats and Phishing is one of the threat. Phishing is an online uniqueness fraud, which intends to seize classified data mainly alias name, keys and online trading aspects from its sufferers. Primarily, an intruder cheats people to disclose sensible data by emailing a fraudulent broadcast to huge number o...

2012
R. M. S. Parvathi

Serious security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید