نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

2014
Aikaterini Mitrokotsa

Access to restricted services and/or places requires authentication. However, authentication is sometimes performed in: i) noisy conditions, ii) hostile environments and iii) constrained settings. By noisy conditions, we refer to noise in the communication channel that may lead to modification of the transmitted information. By hostile environments we mainly refer to environments where attacker...

2005
Katrin Hoeper Guang Gong

Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. In this chapter, a security framework for authentication and authenticated key exchange in ad hoc networks is introduced. The framework is applicable to general ad hoc networks and formalizes network phases, protocol stages, and design goals. To cope with the divers...

2010
Michael Hutter Martin Feldhofer Thomas Plos

In the last few years, a lot of research has been made to bring asymmetric cryptography on low-cost RFID tags. Many of the proposed implementations include elliptic-curve based coprocessors to provide entity-authentication services through for example identification schemes. This paper presents first results of an 192-bit Elliptic Curve Digital Signature Algorithm (ECDSA) processor that allows ...

Journal: :J. Inf. Sci. Eng. 2002
Sung-Min Lee Tai-Yun Kim

In this paper we propose a two-pass hybrid key distribution and authentication protocol. The proposed protocol minimizes the number of message exchanges and the key management problem as it eliminates KDC, by using both symmetric-key and asymmetric-key schemes. In addition, it guarantees explicit entity and key authentication via a signature scheme based on elliptic curve cryptosystems (ECC) wh...

2009
Zhijun Li Guang Gong

Mutual entity authentication plays an important role in securing wireless sensor networks. In this paper, we present a computationally efficient authentication framework, based on learning parity with noise problem. The authentication only requires the simplest bitoperations, which makes it suitable for resource-restrained wireless sensor networks. The framework not only presents an approach to...

2017
Dongwoo Kang Jaewook Jung Donghoon Lee Hyoungshick Kim Dongho Won

The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an...

Journal: :IACR Cryptology ePrint Archive 2010
Jesse Walker Jiangtao Li

Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, we show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared key between them. We propose a modification to the SIGMA key exch...

2013
IKECHUKWU K. AZOGU HONG LIU Hong Liu

Security authentication verifies the identity of an entity in a networked system. Risk assessment of an authentication mechanism is paramount to assure the security of a system, especially for today's ubiquitous deployment of Radio Frequency Identification (RFID) systems. Though experts in performability engineering have extended modelbased evaluation techniques to assess security attributes su...

2004
Andreas Pashalidis Chris J. Mitchell

At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single Sign-On (SSO) has been proposed as a solution to the usability, security and management implications of this situation. Under SSO, users authenticate themselves only once to an entity termed the ‘Authentication Service Provider’...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید