نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

2008
Lars-Helge Netland

The authors assess risks associated with the authentication service and discuss the non-repudiation service of BankID, a security infrastructure owned by the Norwegian banks.

2009
Mayla Brusò Agostino Cortesi

This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchholtz and H. Gao for authentication and freshness analyses. The result is an analysis that can statically che...

Journal: :Computer Languages, Systems & Structures 2010
Mayla Brusò Agostino Cortesi

This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchholtz and H. Gao for authentication and freshness analyses. The result is an analysis that can statically che...

2004
Kuenliang Sue Wanpu Hsieh

Trade security is the main point of the payment system. The system should fit the security issues such as confidentiality, authentication, and non-repudiation. However, the privacy problem seems to be ignored. This article proposes a new structure to improve the privacy of mobile payment system when consumers buy something via mobile device. The new system needs to fit three points: familiarity...

Journal: :CoRR 2011
A. S. N. Chakravarthy A. S. S. D. Toyaza

With the explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Various antidotes that are in fact inextricable with security issues are – Cryptography, Authentication, Int...

1996
Wenbo Mao

Recently, two major bankcard payment instrument operators VISA and MasterCard published speciications for securing bankcard payment transactions on open networks for open scrutiny. SEPP.) Based on their success in operating the existing on-line payment systems, both proposals use advanced cryptographic technologies to supply some security services that are well-understood to be inadequate in op...

2013
Khalid Waleed Hussein Ramlan Mahmod Taufik Abdullah

Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive information can lead to loss of clients in the banking sector or threaten national security. Access to sensitive information starts with e-authentication. Most authentication systems are designed for authenticated users only. However, the user is not the only party that needs to be authenticated to ...

2006
Peter Stifter Kurt Eberhardt Arnold Erni Karl Hofmann

Sensors in a networked environment which are used for security applications could be jeopardized by man-in-themiddle or address spoofing attacks. By authentication and secure data transmission of the sensor’s data stream, this can be thwart by fusing the image sensor with the necessary digital encryption and authentication circuit, which fulfils the three standard requirements of cryptography: ...

2011
Daniel Hartung Christoph Busch

The BTA protocol for biometric authentication of online banking transactions is extended to allow for multiple person authenticated transactions. In addition a formal specification is given, the protocol is modelled in the applied pi calculus and the security properties of data and person authentication as well as non-repudiation are verified using the tool ProVerif.

2010
Chin-Ling Chen Ling-Chun Liu Gwoboa Horng

With the progress of the mobile communication technology and the popularity of the handheld devices, mobile commerce is of great importance today. We can use these devices to conduct business, such as to purchase books, and stocks, and digital goods (videos, audios, codes), and to play games, receive email, and even access various network resources. When the requested services need to be verifi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید