نتایج جستجو برای: message authentication
تعداد نتایج: 99488 فیلتر نتایج به سال:
Secured Two Phase Geographic Greedy Forwarding (SecuTPGF) is a geographic greedy forwarding protocol for transmitting multimedia data stream in Wireless Multimedia Sensor Networks (WMSN) in a secure and reliable manner. Cryptographic and MAC authentication mechanisms are used to implement security for both node and message authentication. In this paper, a modified version of SecuTPGF, the GSTP ...
Message Authentication Codes are very sensitive to any change of the message they are appended to. If one or more bits of the message change, Message Authentication Codes change about 50\% of their bits, making the message useless. The successful verification of Message Authentication Codes demands equality of all of bits of the received Message Authentication Code and that one recalculated of ...
--This paper introduces a single method that ensures the Confidentiality, Integrity, Availability and Authentication of the message to be transmitted. Message is encrypted by the latest symmetric encryption standard called AES (Advanced Encryption Standard). A new method for calculating MAC (Message Authentication Code) based on the shared secret key used in AES, is proposed that proves the mes...
Although key distribution is arguably the most studied context on which to apply quantum cryptography techniques, message authentication, i.e. certifying the identity of the message originator and the integrity of the message sent, can also benefit from the use of quantum resources. Classically, message authentication can be performed by techniques based on hash functions. However, the security...
This paper presents a robust image authentication approach that distinguishes malicious attacks from JPEG lossy compression. The authentication procedure calculates the relationships between important DCT coefficients in each pair of DCT blocks and predefined thresholds to form the authentication message, and then embeds the encryption of the authenticated message into other DCT coefficients. T...
In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W1,W2) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifical...
-A vehicular ad hoc network (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to received message. In this paper ,signcryption message authentication protocol (SMA...
A message authentication code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large numb...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
Syntax Notation One (ASN.1) [3] was chosen for representing all data types and exchange formats defined in OEP. ASN.1 is a standard notation used for describing rules and structures for information data. Many communication protocols specifications define messages as binary values of sequences of octets. ASN.1 provides means of defining complex data types and messages without necessarily determi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید