نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

2010
Celia Li Uyen Trang Nguyen

We aim at extending IEEE 802.11s standards to implement fast hand-off to support real-time applications such as VoIP and audio/video conferencing. We propose a novel trust model that represents the trust relationships among the entities of a WMN, and new authentication protocols based on that model. A client and a mesh access point (MAP) mutually authenticate each other using one-hop communicat...

2013
Shaveta Rani Paramjeet Singh Raman Preet

A Mobile Ad hoc Network (MANET) is a temporary network of wireless mobile devices deployed without the aid of any pre-existing infrastructure or centralized administration. But this fascinating technology is studded with a number of serious challenges that need to be well catered before its successful deployment. These challenges include security issues related to key management, routing, node ...

1988
Louis C. Guillou Jean-Jacques Quisquater

At EUROCRYPT’88, we introduced an interactive zero-howledge protocol ( G ~ O U and Quisquater [13]) fitted to the authentication of tamper-resistant devices (e.g. smart cads , Guillou and Ugon [14]). Each security device stores its secret authentication number, an RSA-like signature computed by an authority from the device identity. Any transaction between a tamperresistant security device and ...

Journal: :Journal of Materials Chemistry C 2021

Information security is of great importance for modern society with all things connected. Physical unclonable function (PUF) as a promising hardware primitive has been intensively studied information security. However, the widely investigated silicon PUF low entropy vulnerable to various attacks. Herein, we introduce concept bionic optical PUFs inspired from unique biological architectures, and...

Journal: :International Journal of Advanced Computer Science and Applications 2023

Security is one of the most important issues in layout a Digital System. Communication these days digital. Consequently, utmost care must be taken to secure information. This paper specializes techniques used defend facts from thefts and hacks use quit-to-cease encryption decryption. Cryptography thing technique related Encrypting Decrypting messages. We Signature preferred (DSS) Algorithm (DSA...

2009
Praveen Gauravaram

Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. The standard and widely used hash functions such as MD5 and SHA-1 follow the design ...

Journal: :IJCVIP 2012
Siva Charan Muraharirao Manik Lal Das

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several ...

2004
Rui He Jianwei Niu Jianping Hu Jian Ma

In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service ...

Journal: :فصلنامه علمی پژوهشی گیاهان دارویی 0
n kahkeshani tehran university of medical sciences m khanavi tehran university of medical sciences a hadjiakhoondi department of pharmacognosy and medicinal plants research center, faculty of pharmacy, tehran university of medical sciences, tehran, iran tel: tel/fax: +98 21 66494996

background: nepeta menthoides boiss & buhse is a species from lamiaceae family. it is used as a herbal medicine with common name “ostokhodus” in iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. objective: in this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of n. me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید