نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

2004
Pietro Michiardi Refik Molva

This paper presents an authentication scheme (IDHC) based on an original concept that combines a simple form of identity-based cryptography with the Lamport’s keyed hash chain method. In this solution, users contact a key distribution center (KDC) and receive a master authentication ticket M tightly bound to the users’ identity. M is used as a seed to generate a chain of authentication tickets ...

Journal: :Journal of Computer Science and Information Technology 2014

2009
Michael Wagner

The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...

2015
Michael Wagner

The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...

2013

Fact: Tellabs Optical LAN provides Access Control Lists (ACLs), Broadcast Datagram Rate Limiting at each user device and strong authentication. Authentication based on 802.1x allows multiple devices per user port along with advanced intrusion detection — effectively locking down the physical port upon detection of an untrusted device. ACLs provide flexibility to statically and/or dynamically pe...

1996
Yuliang Zheng

The main contributions of this paper are to analyze an authentication and key distribution protocol for mobile computing proposed by Beller Chang and Yacobi in and reveal two problems associated with their protocol to propose a new authentication and key distribution protocol that utilizes a broadcast channel in a mobile network A particularly interesting feature of the new proposal is that it ...

Journal: :International Journal of Computer Science and Informatics 2014

2005
Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. μTESLA and multi-level μTESLA have been proposed to provide such service for sensor networks. However, none of these techniques are scalable in terms of the number of senders. Though multi-level μTESLA schemes can scale up to large senso...

2005
Meng-Yen Hsieh Yueh-Min Huang

Due to node mobility, the ad hoc network topology is dynamical so that on-demand routing protocols are more fit than other routing protocols. Most secure on-demand routing protocols are designed that the destination or source is able to detect the attacks on routing paths after accepting routing requests or routing replies. In this paper, we present a secure on-demand source routing protocol wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید