نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

Journal: :Computers & Security 2005
Yacine Challal Abdelmadjid Bouabdallah Hatem Bettahar

Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important i...

2002
Alain Pannetrat Refik Molva

In this work we propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are signed together in a block and the recipient can authenticate this block if the loss rate per block is lower than a certain threshold, which can be chosen based on the characteristic of the communication channel. This sc...

2004
Yacine Challal Hatem Bettahar Abdelmadjid Bouabdallah

Many group-oriented applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. As multicast groups size may be very large and the exchanged data volume may be important (streaming), a source authentication scheme should take i...

Journal: :I. J. Network Security 2009
Jie Liu Jianhua Li

Key authentication is very important in secret communications and data security. Lee et al. proposed a new public key authentication scheme for cryptosystems based on discrete logarithms in 2003. Recently, Zhang et al. pointed out that Lee et al.’s scheme was not secure and proposed an improvement on it. However, in this paper, we will demonstrate that a dishonest user can forge the public key ...

2008
A. Selcuk Uluagac Christopher P. Lee Raheem A. Beyah John A. Copeland

Over the years, a myriad of protocols have been proposed for resource-limited Wireless Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the years. Although fundamental notions of WSN research are well established, optimization of the limited resources has motivated new research directions in the field. In this paper, we seek to present general principles to ai...

2011
Esam A. A. Hagras Maha Amer Hazem H. Aly

In this paper, we propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the user identity privacy, mutual authentication, nonrepudiation. This study also pr...

2000
Matt Curtin

We describe Shibboleth, a program to manage private Internet mailing lists. Differing from other mailing list managers, Shibboleth manages lists or groups of lists which are closed, or have membership by invitation only. So instead of focusing on automating the processes of subscribing and unsubscribing readers, we include features like SMTP forgery detection, prevention of outsiders’ ability t...

2005
LIANG TIAN REINER DOJEN TOM COFFEY

Cryptographic protocols are designed to provide security services, such as key distribution, authentication and non-repudiation, over insecure networks. The design process of cryptographic protocols is highly complex. In particular, the translation from the informal protocol description to the formal protocol specification is an error-prone step, as the exact meaning of the requirements of the ...

Journal: :RFC 2005
Adrian Perrig Dawn Xiaodong Song Ran Canetti J. Doug Tygar Bob Briscoe

This document introduces Timed Efficient Stream Loss-tolerant Authentication (TESLA). TESLA allows all receivers to check the integrity and authenticate the source of each packet in multicast or broadcast data streams. TESLA requires no trust between receivers, uses low-cost operations per packet at both sender and receiver, can tolerate any level of loss without retransmissions, and requires n...

2013
Hassan Elkamchouchi Eman Abou El-kheir Yasmine Abouelseoud

Authentication and confidentiality are the most important security goals to be achieved. This paper proposes a new tripartite signcryption scheme without bilinear pairings. The proposed tripartite signcryption scheme is efficient when three entities want to perform secure transactions as in mobile communication or in e-commerce. The proposed scheme is based on the elliptic curve discrete logari...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید