نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

Journal: :Applied Mathematics and Computation 2005
Ren-Junn Hwang Chih-Hua Lai Feng-Fu Su

An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed scheme takes lower computation and communication cost to provide security functions. It not only provides message confidentiality, authentication, integrity, unforgeability, and non-repudiation, but also forward secrecy for...

2009
Igor Nai Fovino Andrea Carcano Marcelo Masera Alberto Trombetta

The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically targe...

2012
Sravan Kumar D. Sravan Kumar

Cryptography is a key technology in electronic security systems. Modern cryptographic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. The increased use of computer and communication systems by industry has increased the risk of theft of proprietary information. In general, cryptographic primitives a...

Journal: :IACR Cryptology ePrint Archive 2011
Md. Golam Kaosar

Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, privacy, a secret key (or session key) is necessary to be shared between the sender and receiver. Because of the nature of MANET, it is unrealistic in many circumstances to implement Certification A...

2013
Vineeta Tiwari Neha Chandel Anshul Jain

Information Security and integrity are becoming more important as we use email for personal communication and business. As it is excessively used it is highly prone to Cyber Attacks, threats and malwares. The most common of these are masquerading, modification, and Phishing attacks. In order to provide security against these, many tools have been proposed such as Privacy Enhancement Mail (PEM),...

2011
ABHISHEK ROY SUNIL KARFORMA

With the advancement of Information and Communication Technology (ICT), Information has become the most easily accessible yet very valuable commodity. Since the successful implementation of various electronic mechanisms like E-Governance, E-Commerce, E-Learning, E-Health, MGovernance, M-Insurance, etc are totally dependable on the security and authenticity of the information, it is very much su...

2003
Hathai Tanta-ngai Tony Abou-Assaleh Sittichai Jiampojamarn

Simple Mail Transfer Protocol (SMTP) is a common protocol for transferring email messages worldwide. SMTP is anonymous and provides only the basic functions required to transfer a message, namely specifying a sender, recipients, and message text. SMTP was designed without consideration for security. We propose a new protocol, Secure Mail Transfer Protocol (SecMTP), to provide user-to-user secur...

2000
Olivier Markowitch Steve Kremer

In this paper we consider the optimistic approach of the non-repudiation protocols. We study a non-repudiation protocol with off-line trusted third party and we keep on with the definition of the multi-party non-repudiation, compare it to multi-party fair exchange and show some fundamental differences between these two problems. Finally, we generalize our protocol and propose a multi-party non-...

2015
Sumit Chakraborty

This work defines the security intelligence of a system based on secure multi-party computation in terms of correctness, fairness, rationality, trust, honesty, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system ...

Journal: :CoRR 2013
R. A. K. Saravanaguru George Abraham Krishnakumar Ventakasubramanian Kiransinh Borasia

This paper is aimed to evaluate the importance of XML Signature and XML Encryption for WS-Security. In today’s e-business scenario, organizations are investing a huge amount of their resources in Web Services. Web Service Transactions are done mainly through plain-text XML formats like SOAP and WSDL, hence hacking them is not a tedious task. XML Signature and XML Encryption ensure security to X...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید