نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

2010
JOSEPH M. KIZZA

In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are several zero-knowledge protocols (ZKP) including the ...

2003
A. F. Al Shahri D. G. Smith J. M. Irvine

Both the size, and the interconnectivity of computer networks are increasing tremendously. However, the possibility of an attack compromising the network is also increasing, making network security critical. Strong authentication protocols are needed to restrict network access to only authorised users. Most existing protocols for authentication and network access are based on centralised authen...

Journal: :Future Generation Comp. Syst. 2018
Sven Kiljan Harald P. E. Vranken Marko C. J. D. van Eekelen

Authentication is a major research topic in the information security field. Much has been written about assessing entity (user) authentication methods, but there is a lack of literature concerning the evaluation of financial transaction authentication in online banking. Entity authentication methods have been systematized by quantifying their qualitative aspects, but there is no evaluation mech...

2015
Atul Chaturvedi Neelam Srivastava Varun Shukla S. P. Tripathi Manoj Kumar Misra D. Balfanz D. K. Smetters P. Stewart

Entity authentication and key distribution are very important cryptographic problems in mobile communication or in ad-hoc networks or in wireless communication at large. Mutual entity authentication is seen as the necessary process to the establishment of a secure and authentic connection. For a reliable secure communication, mutual entity authentication is very often seen as the necessity to t...

2012
HongIl Ju JongWook Han

In this paper we describes the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and message authentication. We applied the authenticat...

2009
Yan-Jiang Yang Jian Weng Feng Bao

Password authentication is the most commonly accepted means for entity authentication. To meet the increasing need of preserving individual privacy, anonymous password authentication has been proposed recently, to augment password authentication with the protection of user privacy. In this paper, we analyze the weaknesses inherent to anonymous password authentication, which make it questionable...

2013
James Alderman Jason Crampton

Key Assignment Schemes (KASs) have been extensively studied in the context of cryptographicallyenforced access control, where derived keys are used to decrypt protected resources. In this paper, we explore the use of KASs in entity authentication protocols, where we use derived keys to encrypt challenges. This novel use of KASs permits the efficient authentication of an entity in accordance wit...

Journal: :Wireless Networks 2011
Raphael C.-W. Phan

Wireless mesh networks (WMNs) are a kind of wireless ad hoc networks that are multi-hop where packets are forwarded from source to destination by intermediate notes as well as routers that form a kind of network infrastructure backbone. We investigate the security of the recently proposed first known secure authentication and billing architecture for WMNs which eliminates the need for bilateral...

2006
Sasha Romanosky

• Authentication and authorization • Pass-sentences, pass-phrases and mnemonic passwords • Randomly generated passwords • User Study: Human selection of text passwords 1.1 Authentication and authorization The management of multiple versions of user identities across multiple applications is difficult and one type of building blocks of identity management is 1 : • Password reset • Password synch...

1993
Mihir Bellare Phillip Rogaway

Entity authentication and key distribution are central cryptographic problems in distributed computing|but up until now, they have lacked even a meaningful de nition. One consequence is that incorrect and ine cient protocols have proliferated. This paper provides the rst treatment of these problems in the complexity-theoretic framework of modern cryptography. Addressed in detail are two problem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید