نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

2016
Ayaz Hassan Moon Ummer Iqbal Francisco Sanchez-Rosario Adrian Perrig John Stankovic David Wagner Robert Szewczyk J. D. Tygar Victor Wen

Authentication is an important Security primitive in any class of network both at the entity level as well as at the message level. All the network entities comprising of WSN including nodes, cluster heads and base station need to be authenticated before sending or receiving any kind of communication within them. Public Key Cryptography offers broad based solutions to address all the security c...

1997
Colin Boyd

The importance of clarifying the goals of a cryptographic protocol is widely recognised. The majority of authors have addressed intensional goals which are concerned with correct operation within the protocol itself. Extensional goals are properties independent of the protocol and deene what the protocol is designed to achieve. This paper reviews the previous literature on goals in protocols an...

2007
Austin Mohr

Zero-knowledge proofs are proofs that show a statement to be true without revealing anything other than the veracity of the statement to be proven. After a formal definition of zero-knowledge proof schemes and a simple example, zero-knowledge proofs for Graph Isomorphism and Graph 3-colorability are presented, the latter being the basis for the proof that all languages in NP have zero-knowledge...

Journal: :IACR Cryptology ePrint Archive 2007
Shu Yun Lim Chuan Chin Pu Hyotaek Lim Hoon-Jae Lee

Sensor networks offer economically viable monitoring solutions for a wide variety of applications. In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Disclosure, disruption and deception threats can be defeated by authenticating data sources as well as encrypting data in...

2000
Reto Kohlas Ueli Maurer

Public-key authentication based on public-key certificates is a special case of the general problem of verifying a hypothesis (that a public key is authentic), given certain pieces of evidence. Beginning with PGP, several authors have pointed out that trust is often an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management, for dealing with this ...

Journal: :I. J. Network Security 2016
A. Prakash R. Dhanalakshmi

Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in diverse fields. It ensures actual presence of biometric entity of a person in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem. Also in the previous work they use face and dre...

Journal: :JSW 2013
Shen-Gang Hao Li Zhang Muhammad Ghulam

With the development of network service technology such as grid computing, cloud computing, the cooperation among multiply domains is needed for these intelligent services that have the unlimited space and the unlimited speed. This paper proposes a new union authentication protocol of cross-domain that can ensure the security of resource access in different domains, where the register keys of m...

Journal: :amirkabir international journal of modeling, identification, simulation & control 2014
f. naji mohades m. h. yaghmaee moghadam

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

Journal: :Information Security Journal: A Global Perspective 2012
Syed Akram Mohammed Misbahuddin G. Varaprasad

This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید