نتایج جستجو برای: bilateral authentication
تعداد نتایج: 117646 فیلتر نتایج به سال:
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server...
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving mes sages (with nonces, public and private encryptions etc.), and has both temporal and epistemic operators (describing the knowledge of participants). The logic’s semantics is based on strand spaces. Several (secrecy or authentication)...
Authenticated multiple key agreement (AMKA) protocols provide participants with session keys after one round of authentication. Many schemes use Diffie–Hellman or authenticated that rely on hard integer factorizations are vulnerable to quantum algorithms. Lattice cryptography provides resistance protocols, but the certificate always incurs excessive public infrastructure management overhead. Th...
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...
identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. the aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in iran. in this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید