نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

2006
Yu Hua Bin Xiao

A Bloom filter has been widely utilized to represent a set of items because it is a simple space-efficient randomized data structure. In this paper, we propose a new structure to support the representation of items with multiple attributes based on Bloom filters. The structure is composed of Parallel Bloom Filters (PBF) and a hash table to support the accurate and efficient representation and q...

Journal: :Computers & Security 2005
Yacine Challal Abdelmadjid Bouabdallah Hatem Bettahar

Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important i...

2008
Michael T. Goodrich Charalampos Papamanthou Roberto Tamassia Nikos Triandopoulos

We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system’s integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring tec...

2014
Tapalina Bhattasali Khalid Saeed Nabendu Chaki Rituparna Chaki

Rapid development of smart technologies enables use of cloud service for large-scale data storage. Remote access of original data as well as biometric data from cloud storage enhances several challenges. It is inevitable to prevent unauthorized access of data stored in cloud. Biometrics authentication is more efficient than the known traditional authentication mechanisms. Authentication is a ma...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

ژورنال: پیاورد سلامت 2020
Hosseini, Foroughosadat , Ronaghi, Mohammad Hossein ,

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

Journal: :avicenna journal of phytomedicine 0
mohammad reza joharchi ferdowsi university of mashhad, mashhad, i. r. iran mohammad sadegh amiri department of biology, payame noor university, tehran, i. r. iran

identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. the aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in iran. in this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...

2008
Yan Liang Chunming Rong

RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional objects information and can be used for other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems, in particular against tag cloning and informati...

Journal: :IJSN 2010
Shih-I Huang Shiuh-Pyng Shieh

This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture (ARIES) consisting of RFIDs and wireless sensor nodes, a mutual authentication protocol (AMULET), and a Secret Search Protocol (SSP). ARIES utilises RFID-aware sensor nodes to alleviate distance limitation problem in R...

2007
HUEY-MING LEE TSANG-YEAN LEE CHENG-SHENG CHEN

We propose the encryption and decryption algorithm to produce authenticator. In local execute grid node, we use this authenticator to build user information data base and do authentication application. In supervisor grid node, we use the authenticator to build remote user information data base and do authentication application. When these algorithms install in all grid nodes, we can run authent...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید