نتایج جستجو برای: mutual authentication
تعداد نتایج: 76549 فیلتر نتایج به سال:
The Personal Distributed Environment (PDE) is a new concept arising in personal communications beyond 3G (B3G). This paper briefly describes the environment, surveys the protocols available to provide PDE authentication, and assesses their suitability for adaptation to the PDE.
In this paper we describes the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and message authentication. We applied the authenticat...
Wireless local area networks (wireless LANs, or WLANs) are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired data transfer, as its physical layer is not contained in the wire. Extensible Authentication Protocol –Transport Layer Security is completely password cracking resistant because it does not rely on user passwords. Extensi...
We show that the free-riding problem in short-lived teams is not as severe as previously thought. Two critical conditions are: team members can observe each other’s effort periodically, which makes mutual monitoring possible; technology is convex (increasing marginal returns) or has a “completion benefit.” In principal-agent settings, mutual monitoring reduces the necessary wage payment to indu...
Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took place. In this study, we construct a fully deniable mutual authentication protocol based on RSA signature, and then a deniable authenticated key exchange protocol is constructed from the proposed protocol.
The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications...
Compound authentication protocols, such as EAP in IKEv2 or SASL over TLS, bind application-level authentication to a transport-level authenticated channel in order to obtain strong composite authentication under weak trust assumptions. Despite their wide deployment, these protocols remain poorly understood, leading to several credential forwarding man-in-themiddle attacks. We present formal mod...
Remote mutual authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. In 2006, Shieh-Wang pointed out the weakness of Juang’s remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. However, this pap...
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maintain verifier table. But their scheme has few weaknesses and cannot achieve mutual authentication. In 2005, Liao, Lee and Hwang showed that Das et al. scheme is vulnerable to guessing attack and proposed an enhanced sch...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید