Distributed authentication for randomly compromised networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed authentication for randomly compromised networks

We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution’s major security weaknesses: the requirement of an authenticated classical channel to prevent man-in-the-middle attacks. Our scheme uses classical secret sharing techniques and partially trusted intermediaries and provides arbitrarily high confidence in the securi...

متن کامل

Distributed Authentication for Peer-to-Peer Networks

A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Security services for adhoc networks cannot assume the existence of a particular infrastructure. Peer-to-peer technology is promising in addressing security issues in ad-hoc networks. We provide a novel; cryptographically se...

متن کامل

Distributed H∞ filtering over randomly switching networks

The paper considers a distributed robust estimation problem over a network with randomly changing topology. The objective is to deal with these changes locally, by switching observer gains at affected nodes only. We propose sufficient conditions which guarantee a suboptimal H∞ level of disagreement of estimates in such observer networks, both in the mean-square sense and with probability 1. Whe...

متن کامل

Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network

We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution’s major limitations: the short maximum transmission distance (∼ 200 km) possible with present day technology. Our scheme uses classical secret sharing techniques to allow secure transmission over long distances through a network containing randomly-distributed ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: New Journal of Physics

سال: 2009

ISSN: 1367-2630

DOI: 10.1088/1367-2630/11/8/085005