نتایج جستجو برای: hmac
تعداد نتایج: 237 فیلتر نتایج به سال:
This paper proposes the rescheduling of the SHA-1 hash function operations on hardware implementations. The proposal is mapped on the Xilinx Virtex II Pro technology. The proposed rescheduling allows for a manipulation of the critical path in the SHA-1 function computation, facilitating the implementation of a more parallelized structure without an increase on the required hardware resources. T...
VANET is a subclass of MANET in which each vehicle acts as a node. In VANET Road Side Units (RSUs) are responsible for distributing group private keys and managing vehicles in a localized manner for every 100 to 300 m. Then, use a Hash Message Authentication Code (HMAC) to avoid time consuming CRL checking and to ensure the integrity of messages. Cooperativemessage authentication scheme is main...
A hash function is a function that takes a set of characters called plaintext and converts it to a form that is very difficult to revert back to the original set of characters. Hash functions play very important role in computer security, computer vision, bloom filters and search algorithms. The current cryptographic hash functions such as Hashed Message Authentication Code (HMAC), Message Dige...
The mobile Virtual Private Network (MVPN) of the Internet Engineering Task Force (IETF) is not designed to support NEtwork MObility (NEMO) and is not suitable for real-time applications. Therefore, architecture and protocols to support VPN in NEMO are needed. In this paper, we propose a cost-effective and secure mobility management scheme (SeSIP) that is based on session initiation protocol (SI...
Cloud computing provide different services to user. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. To solve the problem of Key management, Key Sharing various schemes have been proposed. The pape...
This paper presents a study about Machine Learning approach for modeling the stiffness of different high-modulus asphalt concretes (HMAC) prepared in laboratory with harder paving grades or polymer-modified bitumen which were designed without reclaimed (RA) content. Notably, mixtures considered this are not part purposeful experimentation support modeling, but practical solutions developed actu...
Differential and linear attacks are the most widely used cryptanalytic tools to evaluate the security of symmetric-key cryptography. Since the introduction of differential and linear attacks in the early 1990’s, various variants of these attacks have been proposed such as the truncated differential attack, the impossible differential attack, the square attack, the boomerang attack, the rectangl...
The Wired Equivalent Privacy (WEP) is defined as part of the IEEE 802.11 standard to provide secure communication over a wireless channel. However, it suffers serious security flaws, such as the vulnerability of RC4 to keystream reuse and the misuse of CRC checksum in ensuring data integrity. In this paper, we design, implement, and evaluate a software (middleware) approach, which runs on top o...
In software defined networks (SDNs), the controller is a critical resource, yet it potential target for attacks as well. The conventional OpenFlow Discovery Protocol (OFPD) used in building topological view has vulnerabilities that easily allow attackers to poison network topology by creating fabricated links with malicious effects. OFDP makes use of link layer discovery protocol (LLDP) discove...
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید