نتایج جستجو برای: authentication protocols

تعداد نتایج: 131388  

Journal: :Computers 2022

The Internet of Things (IoT) has become one the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, common technologies communication Wi-Fi 2G/3G/4G cellular networks are insufficient for IoT because they designed to serve appliances with immense processing capabilities laptops PCs. ...

Journal: :Mathematics 2022

The Diophantine equation is a strong research domain in number theory with extensive cryptography applications. goal of this paper to describe certain geometric properties positive integral solutions the quadratic x12+x22=y12+y22(x1,x2,y1,y2>0), as well their use communication protocols. Given one pair (x1,y1), finding another (x2,y2) satisfying x12+x22=y12+y22 challenge. A novel secure auth...

2008
Bezawada Bruhadeshwar Kishore Kothapalli

We address the problem of message authentication in communication networks which are resource constrained or are performance bound. Recent research has focused on development of symmetric key protocols for authentication in such networks. In these protocols, the sender generates a pool of keys -used to sign the messages, and distributes a different subset of keys -used to verify the signatures,...

2000
Chi-Chun Lo Yi-Chun Yeh

Ž . The broadband integrated services digital network B-ISDN offers a wide variety of services to its customers. From both provider’s and user’s perspective, a fair and flexible billing system is indispensable to the operation of B-ISDN. In this paper, we discuss different billing policies, and their corresponding authentication protocols, which can be used by the B-ISDN billing system. Flat ra...

Journal: :JDIM 2011
Toru Nakamura Shunsuke Inenaga Daisuke Ikeda Kensuke Baba Hiroto Yasuura

This paper focuses on authentication with three types of entities: a user who sends an authentication request, an service provider who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay att...

Journal: :Security and Communication Networks 2017
Mohamed Amine Ferrag Leandros A. Maglaras Helge Janicke Jianmin Jiang Lei Shu

In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) I...

Journal: :JoWUA 2016
Huihui Yang Vladimir A. Oleshchuk Andreas Prinz

Scyther [1] is a tool designed to formally analyze security protocols, their security requirements and potential vulnerabilities. It is designed under the perfect or unbreakable encryption assumption [2], which means that an adversary learns nothing from an encrypted message unless he knows the decryption key. To our best knowledge, most protocols analyzed using Scyther are widely used standard...

Journal: :Journal of Computer Security 2015
Christos Dimitrakakis Aikaterini Mitrokotsa Serge Vaudenay

We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a number of authentication protocols, where at least some part of the authentication is performed during a phase, lasting n rounds, with no error correction. This requires assigning an acceptable threshold for the number of de...

2015
Wang Guowei Jia Zongpu Peng Weiping

To solve the problems about securities, absence of calculation pertinence, incapability of making the most of the reader’s computation and storage capacity that emerged in Radio Frequency Identification (RFID) authentication protocols, the paper proposes a Hash function based server/serverless adaptive and mutual authentication protocol of RFID based on the analysis of RFID authentication proto...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید