نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :Concurrency and Computation: Practice and Experience 2017
Mian Ahmad Jan Priyadarsi Nanda Muhammad Usman Xiangjian He

2004
Karen Louise Billington Allan Tomlinson

The Personal Distributed Environment (PDE) is a new concept arising in personal communications beyond 3G (B3G). This paper briefly describes the environment, surveys the protocols available to provide PDE authentication, and assesses their suitability for adaptation to the PDE.

2012
HongIl Ju JongWook Han

In this paper we describes the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and message authentication. We applied the authenticat...

2012
G. Raghu

Wireless local area networks (wireless LANs, or WLANs) are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired data transfer, as its physical layer is not contained in the wire. Extensible Authentication Protocol –Transport Layer Security is completely password cracking resistant because it does not rely on user passwords. Extensi...

2002
Huanxing Yang

We show that the free-riding problem in short-lived teams is not as severe as previously thought. Two critical conditions are: team members can observe each other’s effort periodically, which makes mutual monitoring possible; technology is convex (increasing marginal returns) or has a “completion benefit.” In principal-agent settings, mutual monitoring reduces the necessary wage payment to indu...

Journal: :IACR Cryptology ePrint Archive 2013
Xi Jun Lin Lin Sun

Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took place. In this study, we construct a fully deniable mutual authentication protocol based on RSA signature, and then a deniable authenticated key exchange protocol is constructed from the proposed protocol.

2015
Neetesh Saxena Bong Jun Choi

The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications...

2015
Karthikeyan Bhargavan Antoine Delignat-Lavaud Alfredo Pironti

Compound authentication protocols, such as EAP in IKEv2 or SASL over TLS, bind application-level authentication to a transport-level authenticated channel in order to obtain strong composite authentication under weak trust assumptions. Despite their wide deployment, these protocols remain poorly understood, leading to several credential forwarding man-in-themiddle attacks. We present formal mod...

2011
Eun-Jun YOON

Remote mutual authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. In 2006, Shieh-Wang pointed out the weakness of Juang’s remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. However, this pap...

Journal: :I. J. Network Security 2008
Mohammed Misbahuddin C. Shoba Bindu

Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maintain verifier table. But their scheme has few weaknesses and cannot achieve mutual authentication. In 2005, Liao, Lee and Hwang showed that Das et al. scheme is vulnerable to guessing attack and proposed an enhanced sch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید