نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

Journal: :amirkabir international journal of modeling, identification, simulation & control 2014
f. naji mohades m. h. yaghmaee moghadam

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...

Journal: :RFC 2017
Yutaka Oiwa Hajime Watanabe Hiromitsu Takagi Kaoru Maeda Tatsuya Hayashi Yuichi Ioku

This document specifies a mutual authentication method for the Hyper-text Transfer Protocol (HTTP). This method provides a true mutual authentication between an HTTP client and an HTTP server using password-based authentication. Unlike the Basic and Digest authentication methods, the Mutual authentication method specified in this document assures the user that the server truly knows the user’s ...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

Journal: :IEEE Transactions on Dependable and Secure Computing 2015

F. Naji Mohades M. H. Yaghmaee Moghadam

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

2014
Hae-Jung Kim Eun-Jun Yoon

Mutual authentication is an important security property for providing secure remote communication in client-server environment. Up to now, various remote user authentication schemes with smart card using bilinear pairings were proposed by different researchers. Unfortunately, most previously proposed authentication schemes do not provide mutual authentication and session key agreement. This pap...

Journal: :JCIT 2010
Zuowen Tan

Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.’s authentication protocol cannot provide unlinkage and mutual authentication during the communications between the vehicles and the road-side infrastructure units. In this paper, we propose an improved privacy-preserving mutual authentication protocol f...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

2012
Kuljeet Kaur

Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts with proof of authentication, majority organizations only use password for security but this research pa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید