نتایج جستجو برای: authentication protocols

تعداد نتایج: 131388  

2002
Scott D. Stoller

Authentication protocols are designed to work correctly in the presence of an adversary that can prompt honest principals to engage in an unbounded number of concurrent executions of the protocol. This paper establishes a bound on the number of protocol executions that could be useful in attacks. The bound applies to a large class of protocols, which contains versions of some well-known authent...

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

2009
Malte Borcherding

Solutions for agreement problems in distributed sys tems can generally be divided into two classes authen ticated protocols and non authenticated protocols Au thenticated protocols make use of authenticated mes sages i e the messages can be signed in a way that a signed message can be assigned unambiguously to the signer Few has been said about how to achieve this kind of authentication in some...

2007
Shahabuddin Muhammad Zeeshan Furqan Ratan K. Guha

Recently a Distributed Temporal Protocol Logic has been devised to capture reasoning in the distributed environment of security protocols. Elsewhere we have constructed a proof-based verification framework using distributed temporal protocol logic to verify the authentication property of security protocols. In this paper, we apply our verification framework to a well-known protocol. In particul...

1994
N. Haller R. Atkinson

The authentication requirements of computing systems and network protocols vary greatly with their intended use, accessibility, and their network connectivity. This document describes a spectrum of authentication technologies and provides suggestions to protocol developers on what kinds of authentication might be suitable for some kinds of protocols and applications used in the Internet. It is ...

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

2001
DongGook Park JungJoon Kim Colin Boyd Ed Dawson

Denial-of-service (DoS) attack is one of the most malicious Internetbased attacks. Introduction of cryptographic authentication protocols into Internet environment does not help alleviate the impact of denial-of-service attacks, but rather increases the vulnerability to the attack because of the heavy computation associated with cryptographic operation. Nevertheless, many Internet security prot...

2012
Masoumeh Safkhani Pedro Peris-Lopez Nasour Bagheri Majid Naderi Julio César Hernández Castro

In this paper, we analyze the security of the mutual authentication and search protocols recently proposed by Tan et al. [20]. Our security analysis clearly highlights important security pitfalls in these. More precisely, privacy location of the tags’ holder is compromised by the authentication protocol. Moreover, the static identifier which represents the most valuable information that a tag s...

Journal: :JoWUA 2011
Atsuko Miyaji Mohammad Shahriar Rahman Masakazu Soshi

Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Supply-chain, inventory management are the areas where low-cost and secure batchmode authentication of RFID tags is required. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also...

Journal: :IJSN 2009
Sven Laur Sylvain Pasini

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید