نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

2011
Eun-Jun Yoon

Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual ...

2010
Harinda Fernando Jemal H. Abawajy

Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems employing low cost RFID tags remains an open problem. In this paper we develop and present a RFID security protocol which not only allows mutual authentication and secure transmission of data between the reader and tag b...

2010
Italo Dacosta Patrick Traynor

Authentication is an important mechanism for the reliable operation of any Voice over IP (VoIP) infrastructure. Digest authentication has become the most widely adopted VoIP authentication protocol due to its simple properties. However, even this lightweight protocol can have a significant impact on the performance and scalability of a VoIP infrastructure. In this paper, we present Proxychain –...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2012

Journal: :Applied Computational Intelligence and Soft Computing 2016

Journal: :EURASIP Journal on Wireless Communications and Networking 2006

Journal: :International Journal of Ad hoc, Sensor & Ubiquitous Computing 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید