نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :Journal of Computer Security 1998
Günther Horn Bart Preneel

This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper also demonstrates how a micropayment scheme can be integrated into the authentication protocol; this payment protocol allows for the provision of incontestable charging. The problem of establishing authenticated public keys thro...

Journal: :IJAPUC 2009
John Ayoade Judith A. Symonds

The main features of RFID are the ability to identify objects without a line of sight between reader and tag, read/write capability and ability of readers to read many tags at the same time. The read/write capability allows information to be stored in the tags embedded in the objects as it travels through a system. Some applications require information to be stored in the tag and be retrieved b...

2010
Michael Braun Ulrike Meyer Susanne Wetzel

The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem whil...

Journal: :International Journal of Electronics and Telecommunications 2023

RFID systems are one of the essential technologies and used many diverse applications. The security privacy primary concern in which overcome by using suitable authentication protocols. In this manuscript, cost-effective RFID-Mutual Authentication (MA) a lightweight Extended Tiny encryption algorithm (XTEA) is designed to issues on Hardware Platform. proposed design provides two levels security...

2010
Gildas Avoine Xavier Carpent Benjamin Martin

In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming probability the secret ID of the prover by eavesdropping about 2 authentications. The result dismantles SASI and, more generally, provides a new approach that threatens ultra-lightweight authentication protocols.

2006
Nitesh Saxena Jan-Erik Ekberg Kari Kostiainen N. Asokan

Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted third party. McCune, et al. [4] proposed that one device displays the hash of its public key in the form of a barcode, and the other device reads it using a camera. Mutual authentication requires switching the roles of the...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2014

Journal: :Journal of Multimedia 2014
Lihua Zhang Xichang Dai Youjin Shen

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

Journal: :Journal of Multimedia 2014
Zhongsheng Qiu Fangfang Zhang Yuan Zhou

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

2014
Adarsh Kumar Krishna Gopal Alok Aggarwal

Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید