نتایج جستجو برای: entity authentication

تعداد نتایج: 185705  

2014
Manish Kumar Soni Ashish Vashistha Subir Biswas Jelena Misi ́c Yu-Chih Wei Yi-Ming Chen Hwai-Ling Shan Debasis Giri Durbadal Chattaraj Y. Sun R. Lu X. Lin X. S. Shen Wen Tao Zhu S. D. Galbraith K. G. Paterson Nizar Alsharif Albert Wasef

In vehicular ad hoc networks clever traffic services are efficient if they are connected with method that supervise and create trust among service providers and vehicles. Consequently, the authentication of the providers of traffic condition information and the authorization of entity's to admittance this information is crucial. Consequently it's essential to extend a innovative secur...

1991
C. Fritzner L. Nilsen Å. Skomedal

The paper shows how Security Iqformatwn for user aulhenticatwn, peer-entity authentication and access control is created and w“lised in large distributed systems. The protectwn mechanisms used are hashfwctions, symmetric and asymmetric cryptography. We describeand combine data formats for Secura”tyInjormatwn based on international standardsfrom several stawi-wdisatwn bodies.

Journal: :IACR Cryptology ePrint Archive 2014
Dominique Unruh

We present a quantum position verification scheme in the random oracle model. In contrast to prior work, our scheme does not require bounded storage/retrieval/entanglement assumptions. We also give an efficient position-based authentication protocol. This enables secret and authenticated communication with an entity that is only identified by its position in space.

Journal: :Studies in health technology and informatics 2001
Jonas Hallberg Niklas Hallberg Toomas Timpka

Conventional smart card-based authentication systems used in health care alleviate some of the security issues in user and system authentication. Existing models still do not cover all security aspects. To enable new protective measures to be developed, an extended model of the authentication process is presented. This model includes a new entity referred to as secure server. Assuming a secure ...

2012
Joe-Kai Tsay Stig Fr. Mjølsnes

We report on a deficiency in the specifications of the Authentication and Key Agreement (AKA) protocols of the Universal Mobile Telecommunications System (UMTS) and Long-Term Evolution (LTE) as well as the specification of the GSM Subscriber Identity Authentication protocol, which are all maintained by the 3rd Generation Partnership Program (3GPP), an international consortium of telecommunicati...

Journal: :EURASIP J. Wireless Comm. and Networking 2007
Byung-Rae Lee

The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual aut...

1994
Thomas Beth Malte Borcherding Birgit Klein

Authentication in open networks usually requires participation of trusted entities. Many protocols allow trust to be obtained by recommendation of other entities whose recommendations are known to be reliable. To consider an entity as being trustworthy, especially if there have been several mediators or contradicting recommendations, it is necessary to have a means of estimating its trustworthi...

2013
MOHD IZHAR

IEEE 802.11-2007 Standard for wireless network classifies security algorithms into: RSNA and Pre-RSNA. PreRSNA algorithms are the algorithms used before RSNA. PreRSNA security comprises the algorithms; WEP (Wired Equivalent Privacy) and IEEE 802.11 entity authentication. RSNA security comprises the algorithms like TKIP, CCMP, RSNA establishment and termination procedures, including use of IEEE ...

Journal: :IACR Cryptology ePrint Archive 2010
Kaoutar Elkhiyaoui Erik-Oliver Blass Refik Molva

RFID tags travel between partner sites in a supply chain. For privacy reasons, each partner owns the tags present at his site, i.e., the owner is the only entity able to authenticate his tags. When passing tags on to the next partner in the supply chain, ownership of the old partner is transferred to the new partner. In this paper, we propose ROTIV, a protocol that allows secure ownership trans...

1994
Francisco Jordan Manuel Medina

In this paper, we treat the entity authentication and subsequent key distribution problem in order to enhance multiple-entity (group of entities) communications with confidentiality and integrity services. We first give a summary of the existing methods to solve the key distribution problem. After this introduction of some known methods, we propose a different one, which detailed description wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید