نتایج جستجو برای: authentication protocols

تعداد نتایج: 131388  

Journal: :Int. J. Communication Systems 2013
Daojing He Chun Chen Sammy Chan Jiajun Bu

When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed privacy-preserving universal authentication prot...

Journal: :International Journal of Security and Its Applications 2013

Journal: :International Journal of Engineering and Management Research 2023

Cloud computing technology provides on demand resources like software, hardware and storage in pay-per-use model. is very beneficial for today’s organizations, as there no need to maintain physical infrastructure. These services can be accessed from anywhere anytime over the internet. It cost effective users only pay they use. Many individuals organizations have shifted themselves cloud environ...

2009
Xiaowen ZHANG Lin LEUNG Xiangdong LI

Radio Frequency Identi cation (RFID) authentication protocols are an active and important research topic and many protocols have been proposed. In this paper we examine two hash-function based low-cost authentication protocols, LCAP and OHLCAP, from GNY logic perspective with intention to nd out whether they are convincing that they have achieved their protocol goals. Our analysis shows that LC...

Journal: :International Journal of Distributed and Parallel systems 2011

Journal: :ACM Transactions on Information and System Security 2002

Journal: :International Journal of Computer Applications 2016

Journal: :Mathematics 2023

The Internet of Things (IoT) consists a range devices that communicate with other are surrounding them. Secure communications between IoT have been an essential requirement. However, most existing authentication protocols fail to provide privacy protection for such sensitive information including device owner’s identity and type can be leaked. In this paper, based on attribute-based encryption ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید