نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

Journal: :International Journal of Electronics and Telecommunications 2023

The subject of this study is the non-repudiation security service for network communication using TCP/IP stack. Generated evidence, as well decision-making process registering a given event, are context-aware. Non-repudiation equipped with context-awareness by widely utilized tools. aim paper to present timing results selected tools execution and complete evidence generation time. In some appli...

Journal: :Trans. Computational Science 2010
Jia Fan Yuliang Zheng Xiaohu Tang

Non-repudiation is a very important requirement of signcryption. It ensures that a sender cannot deny the fact that he has signcrypted a message. Non-interactive non-repudiation enables a receiver to settle a repudiation dispute with the help of a judge without the need to engage in costly multi-round interactive communications with the judge. In this paper, we strengthen Malone-Lee’s security ...

2013
Abdesselam Redouane

We describe a calculus that is specific to non-repudiation protocols. The calculus uses the correspondence assertion of Woo and Lam, that is, if there is a non-repudiation of receipt there should be a corresponding non-repudiation of origin. The main contribution of this work lies in the way we model input and output and hence captures nonrepudiation properties. The calculus is a subset of the ...

2001
Nathanael Cottin Bernard Mignot Maxime Wack

− Data certification and digital signature are a new area of interest and many standards have emerged. Indeed, these technologies offer identification, authentication and nonrepudiation capabilities during Internet transactions (emails and e-commerce). However, it appears that both certification and digital signature do not completely answer enterprise data authentication and secured data stora...

2011
Bandu B. Meshram Anjali S. Yeole

All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non -repudiation. The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric usernames and password. Choosing a strong password and protecting the chosen password has always been a popular topic among secur...

Journal: :PeerJ 2021

The information security domain focuses on needs at all levels in a computing environment either the Internet of Things, Cloud Computing, or any other implementation. Data, devices, services, applications and communication are required to be protected provided by shields working states. Remote authentication is perform different administrative operations an system, Administrators have full acce...

2013
Gamil R. S. Qaid Sanjay N. Talbar

The most important factors in e-applications are security, integrity, non-repudiation, confidentiality and authentication services. Nowadays, confidentiality and security of the digital images attract more the attention more, especially when these digital images are transmitted over the internet or stored in some types of memory. Many different image encryption algorithms and techniques have be...

2017
Fara Yahya Robert John Walters Gary B. Wills

The purpose of this paper is to explore the important security factors for protecting data in cloud storage from the perspective of security practitioners. The study consist of 43 security variables (or indicator items) from a survey participated by security practitioners in Malaysia. Exploratory factor analysis (EFA) is conducted to understand the clusters of variables (or indicator items) and...

2012
S. Pavithra

Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The main goal of cryptography is Confidentiality, Integrity, Authentication, Nonrepudiation. Cryptography is widely used by governmental and intelligence agencies around the world to safe transmissio...

Journal: :Journal of Systems Architecture 2023

The Internet of Vehicles (IoV) can significantly improve transportation efficiency and ensure traffic safety. Authentication is regarded as the fundamental defense line against attacks in IoV. However, state-of-the-art approaches suffer from several drawbacks, including bottlenecks single cloud server model, high computational overhead operations, excessive trust servers roadside units (RSUs), ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید