نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

2013
Ramana Murthy Srinivasa Rao

Key transfer protocols needs key generation center (KGC) to select and transport session keys to all communication entities secretly, that are mutually trusted. Often, during registration each entity shares a session keys that are encrypted under another secret key by the KGC. In this paper based on secret sharing scheme, we propose an authenticated key transfer protocol that once KGC can broad...

2001
Gregory T. Byrd Nathan Hillery Jim Symon

CellCase is a commercial high-speed encryptor for Asynchronous Transfer Mode (ATM) networks, available since 1997. It provides data confidentiality and entity authentication at the ATM layer, encrypting ATM cell payloads at rates from T1 (1.5 Mb/s) to OC-12c (622 Mb/s). Though deployed prior to the adoption of the ATM Forum Security Specification (1999), CellCase implements many of the mechanis...

2007
Reto Kohlas Ueli Maurer

Public-key authentication based on public-key certiicates is a special case of the general problem of verifying a hypothesis (that a public key is authentic), given certain pieces of evidence. Beginning with PGP, several authors have pointed out that trust is often an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management, for dealing with this k...

2006
Hassnaa Moustafa Gilles Bourdon Yvon Gourhant

In this paper we make use of the recent advances in 802.11 technologies and the new perspectives for ad hoc networks to provide a novel architecture for Inter-Vehicular communication on highways. This architecture provides authentication and access control for mobile clients on highways and ensures network transparency to mobile clients in their vehicles. We propose an integrated solution consi...

2014
Pranjali Waghmare Rushi Longadge Deepak Kapgate

Security is a important factor in computer system now a days. Users of computer system give a primary preference to security. Authentication is a process used to provide security to the user. Authentication is a process of identifying the person’s identity or conforming the identity of a particular person. There are various authentication method, but most commonly used method is textual passwor...

Journal: :IEEE Journal on Selected Areas in Communications 2014
Aldar C.-F. Chan Jianying Zhou

Entity authentication and related key management is an active research topic in smart grid security. But existing works seem to have overlooked the significance that the smart grid is a cyber-physical system, which entails more considerations in the integration of its cyber and physical domains. Ignoring this could possibly undermine security since the effects of cyber authorization in the smar...

Journal: :J. Internet Serv. Inf. Secur. 2013
José Luis Hernández Ramos Antonio J. Jara Leandro Marín Antonio F. Gómez-Skarmeta

The evolution of the Internet towards the Internet of Things is being deployed in emerging cyberphysical systems such as access control solutions, alert networks, building automation, and the extension of all these systems into Smarter Cities. This extension and proliferation of the technology in our lives is also presenting security challenges, since the unexpected leaks of information, and il...

2003
Daniel Cvrček

Trust can have its life-cycle and we can model it and utilize it for establishing secure environment for mobile environments. We assume that entities in the collaborating environment are mobile. It is not possible to perform entity enrollment. There is no globally trusted third party. Usual authentication mechanisms can not be used. We propose use of trust based on principal behaviour observati...

2008
Jonathan Katz Andrew Y. Lindell

We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender. We suggest aggregate MACs as an appropriate tool for au...

2013
Matthew Areno Jim Plusquellic

Mobile devices are quickly becoming the most used and abundant electronics used today. The ability to positively identify a mobile device and associate it with a specific person or entity is critical to deter theft and provide enhanced security of stored data. This paper presents a novel method for providing device identification through the use of PUF technology that uniquely labels every supp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید