نتایج جستجو برای: deniable authentication

تعداد نتایج: 35051  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

F. Naji Mohades M. H. Yaghmaee Moghadam

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

Mohammad Reza Joharchi Mohammad Sadegh Amiri,

identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. The aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in Iran. In this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...

2014
M. S. Deshmukh

The purpose of this paper is to present the design for providing security and higher authentication scheme for executing secure data transaction in an Organization field over Internet. There has been incessant change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. Authentication schemes that involve more than single level for authent...

2009
David Naccache Rainer Steinwandt Moti Yung

This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E be a public-key encryption algorithm. We observe that if the distributions E(pk0, •) and E(pk1, •) are indistinguishable for two public keys pk0, pk1, then a message bit b ∈ {0, 1} can be embedded in the choice of pkb. As the ...

Journal: :IACR Cryptology ePrint Archive 1996
Ran Canetti Rosario Gennaro

Current secure multiparty protocols have the following deficiency. The public transcript of the communication can be used as an involuntary commitment of the parties to their inputs and outputs. Thus parties can be later coerced by some authority to reveal their private data. Previous work that has pointed this interesting problem out contained only partial treatment. In this work we present th...

Journal: :Journal of Privacy and Confidentiality 2011

Journal: :Scholarpedia 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید