نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

2012
DEVARAKONDA JOHN LIVINGSTONE

The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cry...

2009
Chin-Ling Chen Wei-Chech Lin Zong-Min Guo Yung-Fa Huang Neng-Chung Wang

User authentication is an important security mechanism for recognizing legal remote users. We propose an available and secure authentication scheme for service provider to verify users without using verification table. It can resist most of the attacks by improving nonce-based mutual authentication mechanism, and ensure the security by dynamic session key. User may change his password freely. O...

Journal: :The International Conference on Electrical Engineering 2012

2013
Cuiyun WANG Xiao LI Mingxing HE

Secure user authentication is an important issue in wireless environments. Various user authentication schemes have been proposed in recent years. In 2012, Mun et al. presented an enhanced secure anonymous authentication scheme for roaming service in global mobility networks. However, Mun et al.’s scheme is not secure. In this paper, we show that Mun et al.’s scheme can not provide the mutual a...

2013
Roel Peeters Jens Hermans Junfeng Fan

One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the...

2012
Younghwa An

To improve the security weaknesses in user authentication system, many biometrics-based user authentication schemes using smart cards have been proposed. Das in 2011, proposed an effective biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security flaws of Li-Hwang’s scheme. In this paper, ...

Journal: :Indian Journal of Science and Technology 2015

Journal: :Advances in Electrical and Computer Engineering 2013

Journal: :Informatica, Lith. Acad. Sci. 2010
Chiu-Hsiung Liao Ching-Te Wang Hon-Chan Chen

In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2005a) and Shi et al. (2006) proposed the site authentication schemes by using the generating random numbers. The site authentication can identify a personal computer using LAN card’s Mac address, but the Mac address i...

1999
D Simon

The EAP-TLS Authentication Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید