نتایج جستجو برای: authentication and non repudiation
تعداد نتایج: 17010313 فیلتر نتایج به سال:
Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this we introduce an energy-efficient Virtual Energy-Based Encryption and Keying(VEBEK) scheme for WSNs that reduces the number of transmission needed for rekeying the packets. VEBEK is a secure communi...
Non-repudiation Protocols. During the last decade open networks, above all the Internet, have known an impressive growth. As a consequence, new security issues, like non-repudiation have to be considered. Repudiation is de ned as the denial of an entity of having participated in all or part of a communication. Consider for instance the following scenario: Alice wants to send a message to Bob; a...
That's it, a book to wait for in this month. Even you have wanted for long time for releasing this book secure multi party non repudiation protocols and applications; you may not be able to get in some stress. Should you go around and seek fro the book until you really get it? Are you sure? Are you that free? This condition will force you to always end up to get a book. But now, we are coming t...
Digital signatures have been used in Internet applications to provide data authentication and non-repudiation services. Digital signatures will keep on playing an important role in future Internet applications. There are two most well-known public-key cryptosystems, the RSA scheme and the ElGamal scheme, which can provide both digital signature and data encryption. More recently, the...
Key agreement protocols are a fundamental building block of cryptography to establish a common secret key over public network. We propose an efficient and secure three-pass authenticated key agreement protocol based on elliptic curve where three-pass protocols have significant advantages over two-pass in terms of security properties and applications. The three-pass protocols can prevent denial ...
this study purported to compare and contrast the use of self-mention and evidentials as two mtadiscourse features in opinion columns of persian and english newspapers. the theoretical basis of this study is the idea that metadiscourse features vary across cultural boundaries. for this purpose, 150 persian and 150 english opinion columns were collected based on three factors of topic, audience a...
Improving the Quality of Service (QOS) for the next generation of mobile broadband wireless networks standards; IEEE802.16x becomes the main target for many new researches. This is due to the long time to complete the handover process from the old connection to the new connection in the proposed standard design. In this paper, an improvement to the IEEE 802.11based wireless mesh networks in ter...
Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling informat...
A non-repudiation protocol is aimed for exchanging a digital message and an irrefutable receipt between two mistrusting parties over the Internet. Such a protocol is said fair, if at the end of any possible protocol execution, either both parties obtain their expected items or neither party does. In this paper, we first argue that it is really meaningful in practice to exploit generic fair non-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید