نتایج جستجو برای: authentication protocols

تعداد نتایج: 131388  

2010
Tibor Jager Florian Kohlar Sven Schäge Jörg Schwenk

So far, all solutions proposed for authenticated key agreement combine key agreement and authentication into a single cryptographic protocol. However, in many important application scenarios, key agreement and entity authentication are clearly separated protocols. This fact enables efficient attacks on the näıve combination of these protocols. In this paper, we propose new compilers for two-par...

2012
Ünal Koçabas Andreas Peter Stefan Katzenbeisser Ahmad-Reza Sadeghi

Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In th...

2014
Aikaterini Mitrokotsa

Access to restricted services and/or places requires authentication. However, authentication is sometimes performed in: i) noisy conditions, ii) hostile environments and iii) constrained settings. By noisy conditions, we refer to noise in the communication channel that may lead to modification of the transmitted information. By hostile environments we mainly refer to environments where attacker...

2004
Paulo S. Pagliusi Chris J. Mitchell

Currently there are no Internet access authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/UMTS authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of th...

2000
Tuomas Aura Pekka Nikander Jussipekka Leiwo

Denial of service by server resource exhaustion has become a major security threat in open communications networks. Public-key authentication does not completely protect against the attacks because the authentication protocols often leave ways for an unauthenticated client to consume a server’s memory space and computational resources by initiating a large number of protocol runs and inducing t...

2003
Paulo S. Pagliusi Chris J. Mitchell

Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step tow...

2014
S. Hartman D. Zhang

The IETF is engaged in an effort to analyze the security of routing protocol authentication according to design guidelines discussed in RFC 6518, "Keying and Authentication for Routing Protocols (KARP) Design Guidelines". Developing an operational and management model for routing protocol security that works with all the routing protocols will be critical to the deployability of these efforts. ...

2013
Daisuke Moriyama Miyako Ohkubo Shin'ichiro Matsuo

In this paper, we propose a new variant of indistinguishabilitybased security model for the RFID authentication protocol, which allows an adversary to obtain an authentication result and secret key of a target tag. Ng et al. showed that symmetric-key based RFID authentication protocols cannot be resilient to the above information leakage simultaneously in the Paise-Vaudenay security model. We r...

Journal: :Computer Standards & Interfaces 2014
Hsiu-lien Yeh Tien-Ho Chen Wei-Kuan Shih

In 2014, Yeh et al. proposed a robust smart card secured authentication scheme on SIP using elliptic curve cryptography to conquer many forms of attacks in previous protocols. Yeh et al. claimed that their proposed protocol is more efficient than Diffie-Hellman’s concept authentication protocols for SIP and performs secured mutual authentication, which can be implemented on different real netwo...

2011
S. Saed Rezaie S. Amir Hoseini H. Taheri

As wireless technology is becoming more and more prevalent; security in such networks is becoming a challenging issue and is in great demand. One of the most powerful tools in this area which helps to simulate and evaluate the behaviour of networks and protocols is OPtimised Network Engineering Tool (OPNET). Although OPNET has covered a wide range of models and a variety of protocols, there is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید