نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :International Journal of Engineering & Technology 2018

Journal: :JTIUST (Jurnal Teknik Informatika Unika Santo Thomas) 2022

Our research is the adoption of mutual authentication techniques on smart cards for Digital Rights Management (DRM) which applied using network protocol engineering. We adopted engineering from technique owned by Mifare Desfire card. The tests carried out in our are testing security aspects and data confidentiality. test done changing client server master keys that determine success authenticat...

2012
Yun-Hsin Chuang Yuh-Min Tseng Chin-Laung Lei

Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mobile networks. For personal privacy, it becomes an important is...

Journal: :I. J. Network Security 2018
Debsmita Ghosh Celia Li Cungang Yang

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyberattacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraint...

Journal: :I. J. Network Security 2018
Cheng Guo Chin-Chen Chang Shih-Chang Chang

Mobile user authentication and key agreement for wireless networks is an important security priority. In recent years, several user authentication and key agreement protocols with smart cards for wireless communications have been proposed. In 2011, Xu et al. proposed an efficient mutual authentication and key agreement protocol with an anonymity property. Although the protocol of Xu et al. has ...

2007
JIANG Jun

In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial pro...

Journal: :J. Inf. Sci. Eng. 2007
Keun-Ho Lee Sang-Bum Han Heyi-Sook Suh Chong-Sun Hwang SangKeun Lee

Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH an...

2012
Younghwa An

Password-based authentication scheme is one of the efficient authentication mechanics to protect resources from unauthorized access. Chang-Lee, in 2008, proposed a password-based mutual authentication scheme to overcome the security drawbacks of Wu-Chieu’s scheme. In this paper, we have shown that Chang-Lee’s scheme is vulnerable to various attacks known by literatures. Also we proposed an impr...

Journal: :I. J. Network Security 2008
Da-Zhi Sun Zhen-Fu Cao

In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo’s scheme is vulnerable to an impersonation attack that the attacker without knowing the remote user’s any secret can masquerade as him by obtaining the valid authentication message from any normal session between the remote user and the system. Our ...

2013
Haiyan Sun Qiaoyan Wen Hua Zhang Zhengping Jin

Recently, many identity (ID)-based user authentication and key agreement schemes for mobile client-server environment were proposed. However, these schemes are subjected to an inherent design weakness, namely, the server knows all users’ private keys. Under this problem, these schemes cannot provide insider attack resistance or mutual authentication. Furthermore, some of these schemes cannot si...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید