نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :Computers & Security 2006
Wen-Gong Shieh Jian-Min Wang

A smart card based scheme is very practical to authenticate remote users. In 2004, Juang [Juang WS. Efficient password authenticated key agreement using smart cards. Computers and Security 2004;23:167–73] proposed a mutual authentication scheme using smart cards. The advantages in the scheme include freely chosen passwords, no verification tables, low communication and computation cost, and ses...

2001
Markus Jakobsson David Pointcheval

We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes based on the discrete log gap problem.

2005
Jeongkyu Yang Jaemin Park Hyunrok Lee Kui Ren Kwangjo Kim

Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security vulnerabilities, we propose a robust mutual auth...

2012
Sanjeet Kumar Nayak Subasish Mohapatra Banshidhar Majhi

In this paper, wehave propose a user authentication scheme for cloud computing. The proposed framework providesmutual authentication and session key agreement in cloud computing environment. The scheme executesin three phases such as server initialization phase, registration phase, authentication phase. Detailed security analyses have been made to validate the efficiency of the scheme. Further,...

Journal: :CoRR 2013
Mohamed Naimi Ousmane Thiare

Quorum-based mutual exclusion algorithms enjoy many advantages such as low message complexity and high failure resiliency. The use of quorums is a well-known approach to achieving mutual exclusion in distributed environments. Several distributed based quorum mutual exclusion was presented. The number of messages required by these algorithms require between 3 and 5 , where n is the size of under...

Journal: :DEStech Transactions on Environment, Energy and Earth Sciences 2019

Journal: :Journal of the Korea Society of Computer and Information 2013

Journal: :Journal of Computer and System Sciences 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید