نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :Journal of Communications Software and Systems 2013

2015
You Sung Kang Elizabeth O'Sullivan Dooho Choi Máire O'Neill

Radio frequency identification (RFID) has received much attention both in industry and academia in recent years. To this extent, the international standards group, ISO/IEC JTC 1/SC 31, is in the midst of standardization activity to define the security extension to the EPCglobal Generation 2 (Gen2) ultra high frequency (UHF) air interface protocols for secure RFID communications. In this paper, ...

Journal: :I. J. Network Security 2016
Maged Hamada Ibrahim

Authentication is an important and challenging issue for the security of Fog computing since, services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or Fog nodes). In this paper, we propose a secure and efficient mutual authentication scheme for the EdgeFog-Cloud network architecture, to mutually authenticate Fog users at the Edge of the network, with the Fog ...

2009
Stanislaw Jarecki Xiaomin Liu

A bi-directional Private Authentication, or Unlinkable Secret Handshake, allows two parties to authenticate each other as certified by given certification authorities (i.e. affiliated with given groups), in a mutually private way, in the sense that the protocol leaks no information about either participant to a party which does not satisfy that participant’s authentication policy. In particular...

Journal: :J. Inf. Sci. Eng. 2017
Sivaraman Audithan Vijayaregunathan Vijayasaro Pandi Vijayakumar Varadarajan Vijayakumar

The explosive growth of mobile users has been increasing in the past few years. In this paper, an efficient authentication scheme for distributed mobile cloud computing is proposed. This proposed scheme enables the users to access multiple service providers with a single private key. Instead of opting traditional public key cryptosystem like RSA, the proposed scheme uses bilinear pairing techni...

2004
Shaoquan Jiang Guang Gong

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication (MA). The authors explained that this could be achieved by adding an additional flow. But then this protocol turns out to be 4-round. As it is ...

2014
Nidhi Soni Samidha Dwivedi Sharma

-Security of data is a major issue in RFID environment as RFID is a wireless Radio frequency devices used in the wireless network. The data reads by the tag is send to reader which is then stored at the server, but security is an important concern during the transmission of data from tag to reader. Although there are various security and authentication techniques implemented for the security of...

Journal: :Quantum Information & Computation 2009
Cheng-An Yen Shi-Jinn Horng Hsi-Sheng Goan Tzong-Wann Kao Yao-Hsin Chou

Cheng-An Yen, Shi-Jinn Horng, Hsi-Sheng Goan, Tzong-Wann Kao, Yao-Hsin Chou Department of Computer Science and Information Engineering National Taiwan University of Science and Technology, Taipei 10607, Taiwan Department of Electronic Engineering, National United University Miao-Li 36003, Taiwan Department of Physics, Center for Quantum Science and Engineering, and Center for Theoretical Scienc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید