نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

2010
Antonio San Martino Xavier Perramon

This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...

Journal: :Estudios de economía aplicada 2021

Legal analysis of transaction authentication with the participation legal entities a foreign element (LEFE) is interesting not only in disclosing theoretical and practical issues but also difficulties several features regarding law application. The purpose article to find correct procedure for notarization transactions on territory Ukraine LEFE. In research process, authors combine developments...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

Journal: :avicenna journal of phytomedicine 0
mohammad reza joharchi ferdowsi university of mashhad, mashhad, i. r. iran mohammad sadegh amiri department of biology, payame noor university, tehran, i. r. iran

identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. the aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in iran. in this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

, ,

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

2012
Tiffany Hyun-Jin Kim Virgil D. Gligor Adrian Perrig

The goal of GeoPKI is to enable secure certificate validation (without user interaction) for situations in which a user interacts with an online entity associated with the physical space where the the user trusts (and usually is currently located). GeoPKI enables the owner of a space to associate a certificate with that space, and enables space-based certificate lookup to set up a secure channe...

2007
Geon Woo Kim Deok-Gyu Lee Jong Wook Han Sang Wook Kim

As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in open network. In general deployment of home network, a secure home gateway is located at the boarder of each home and regarded to be a core entity providing services and controlling traffic. ...

Journal: :RFC 2006
Julien Elie

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo defines an extension t...

2013
Bensheng YUN

To enhance the credibility of Web service composition, Pi-calculus based formal modeling of trust Web service composition is proposed. Trust Web service composition is firstly defined abstractly; then Picalculus is used to depict structure and internal interaction of Trust Web service composition, the mapping relation between trust entity and Pi-calculus is provided. Automatic reasoner MWB is a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید