نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :JNW 2014
Aihan Yin Hongchao Liang Ming Zhu

In this paper, we propose a new bidirectional authentication and key agreement protocol based on the MYK-NTRUSign signature algorithm. The AES encryption algorithm and hash techniques were adopted to build our protocol. To implement the mutual authentication and session key agreement, the proposed protocol includes two phases: namely initial phase and mutual authentication with key agreement ph...

2015
Shipra Kataria Rupali Syal

Cloud computing is a service oriented technology which provides various services to users which vary from software to hardware. However, ensuring the security in cloud computing environments is one of the most challenging issues. In cloud, when two parties communicate with each other, mutual authentication is needed for secure communication. This paper proposes a secure mutual authentication mo...

2001
Charlie Kaufman Radia J. Perlman

In this paper we present PDM (Password Derived Moduli), a new approach to strong password-based protocols usable either for mutual authentication or for downloading security information such as the user’s private key. We describe how the properties desirable for strong password mutual authentication differ from the properties desirable for credentials download. In particular, a protocol used so...

2012
Younghwa An

Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication sc...

2011
SK Hafizul Islam G. P. Biswas

In 2011, Debiao et al. proposed an ID-based remote mutual authentication with key agreement scheme on ECC for mobile client–server environment [H. Debiao, C. Jianhua, H. Jin: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security, Information Fusion, 2011]. They claimed their scheme provides remote mutual authentication w...

2005
Shih-I Huang Shiuhpyng Shieh

In this paper, we propose a network architecture with RFIDs and sensor nodes (ARIES), a mutual authentication protocol (AMULET), and a secret search protocol (ASSART). In ARIES, the distance limitation can be relieved with the help of widely deployed RFID-aware sensor nodes. AMULET can perform mutual authentication and reduce the cost for re-authentication. ASSART solves the privacy problem by ...

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

2007
Jason Crampton Hoon Wei Lim Kenneth G. Paterson

Password-based authentication is still the most widelyused authentication mechanism, largely because of the ease with which it can be understood by end users and implemented. In this paper, we propose a security infrastructure for grid applications, in which users are authenticated using passwords. Our infrastructure allows users to perform single sign-on based only on passwords, without requir...

2009
Songyi Kim

RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many res...

Journal: :IJSN 2010
Shih-I Huang Shiuh-Pyng Shieh

This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture (ARIES) consisting of RFIDs and wireless sensor nodes, a mutual authentication protocol (AMULET), and a Secret Search Protocol (SSP). ARIES utilises RFID-aware sensor nodes to alleviate distance limitation problem in R...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید