نتایج جستجو برای: broadcast authentication
تعداد نتایج: 63999 فیلتر نتایج به سال:
This paper presents an authentication scheme (IDHC) based on an original concept that combines a simple form of identity-based cryptography with the Lamport’s keyed hash chain method. In this solution, users contact a key distribution center (KDC) and receive a master authentication ticket M tightly bound to the users’ identity. M is used as a seed to generate a chain of authentication tickets ...
The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...
The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...
Fact: Tellabs Optical LAN provides Access Control Lists (ACLs), Broadcast Datagram Rate Limiting at each user device and strong authentication. Authentication based on 802.1x allows multiple devices per user port along with advanced intrusion detection — effectively locking down the physical port upon detection of an untrusted device. ACLs provide flexibility to statically and/or dynamically pe...
The main contributions of this paper are to analyze an authentication and key distribution protocol for mobile computing proposed by Beller Chang and Yacobi in and reveal two problems associated with their protocol to propose a new authentication and key distribution protocol that utilizes a broadcast channel in a mobile network A particularly interesting feature of the new proposal is that it ...
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. μTESLA and multi-level μTESLA have been proposed to provide such service for sensor networks. However, none of these techniques are scalable in terms of the number of senders. Though multi-level μTESLA schemes can scale up to large senso...
Due to node mobility, the ad hoc network topology is dynamical so that on-demand routing protocols are more fit than other routing protocols. Most secure on-demand routing protocols are designed that the destination or source is able to detect the attacks on routing paths after accepting routing requests or routing replies. In this paper, we present a secure on-demand source routing protocol wi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید