نتایج جستجو برای: authentication protocols
تعداد نتایج: 131388 فیلتر نتایج به سال:
When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed privacy-preserving universal authentication prot...
Cloud computing technology provides on demand resources like software, hardware and storage in pay-per-use model. is very beneficial for today’s organizations, as there no need to maintain physical infrastructure. These services can be accessed from anywhere anytime over the internet. It cost effective users only pay they use. Many individuals organizations have shifted themselves cloud environ...
Radio Frequency Identi cation (RFID) authentication protocols are an active and important research topic and many protocols have been proposed. In this paper we examine two hash-function based low-cost authentication protocols, LCAP and OHLCAP, from GNY logic perspective with intention to nd out whether they are convincing that they have achieved their protocol goals. Our analysis shows that LC...
The Internet of Things (IoT) consists a range devices that communicate with other are surrounding them. Secure communications between IoT have been an essential requirement. However, most existing authentication protocols fail to provide privacy protection for such sensitive information including device owner’s identity and type can be leaked. In this paper, based on attribute-based encryption ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید