نتایج جستجو برای: message authentication

تعداد نتایج: 99488  

2012
Song Han Wanquan Liu Elizabeth Chang L

Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. The proposed protocol in this paper makes use of bilinear pairings over elliptic curves, as well as the Diffie-Hellman key exchange protocol. Besides the security properties shared with previous authe...

Journal: :IEEE Access 2021

The authentication of the navigation signals can be considered as contribution system to robustness against spoofing attacks and it is becoming an important requirement for a growing number user communities. GPS Galileo systems are proposing evolutions their civil embed features authentication. For Galileo, Open Service Navigation Message Authentication (OSNMA) integrated in E1 OS signal. GPS, ...

1992
Yvo Desmedt Jennifer Seberry

Proven secure signature schemes and unconditionally secure authentication schemes with arbiter have been proposed. The former are not practical (too slow) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent...

Journal: :IJSN 2009
Sven Laur Sylvain Pasini

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...

2007
Goce Jakimoski K. P. Subbalakshmi

In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have proposed a generic MAC construction ALRED and a concrete ALRED instance Pelican. The Pelican MAC uses four rounds of AES as a building block to compute the authentication tag in a CBC-like manner. It is about 2.5 times fas...

2011
Anthony Van Herrewege Dave Singelee Ingrid Verbauwhede

The Controller-Area Network (CAN) bus protocol [1] is a bus protocol invented in 1986 by Robert Bosch GmbH, originally intended for automotive use. By now, the bus can be found in devices ranging from cars and trucks, over lightning setups to industrial looms. Due to its nature, it is a system very much focused on safety, i.e., reliability. Unfortunately, there is no build-in way to enforce sec...

2015
S. Divya Lakshmi Devi

Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to falsedata injection attacks. In a large-scale sensor network individual sensors are subject to security compromises. Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however have f...

2016
Jong J. Lee Youn-Sik Hong Ki Young Lee

Authentication is a communication protocol processing procedure. In the Internet of Things, secure communication should be constructed between one "thing" and another by such a procedure. The identity that the second "thing" or object claims should be consistent with what the first one claims. Claimed identity information becomes a single message. Based on this message, we verify the identity o...

2012
Neha Patil N. A. Dhawas

–The process of encryption and message authentication code is conventionally considered as orthogonal security mechanism. The objective of message security mechanism is to validate data authentication, whereas encryption is used to deform the message to achieve data confidentiality. The digital signature and watermarking methods are used for image authentication. Digital signature encodes the s...

1990
D. Richard Kuhn James F. Dray

This paper describes the application of formal specification and verification methods to two microprocessor-based cryptographic devices: a “sman token” system that controls access to a network of workstations, and a message authentication device implementing the ANSI X9.9 message authentication standard. Formal specification and verification were found to be practical, cost-effective tools for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید