نتایج جستجو برای: authenticated
تعداد نتایج: 4119 فیلتر نتایج به سال:
The prominent mode of transportation being used by the public is roadways. Increased usage roadways may lead to many accidents and thefts. major reason violation rules drafted for driving causing mainly youngsters who does not have a proper knowledge license. So this proposed system has some restrictions follow higher safe security, License scanned means NFC tag. When it read reader, Node MCU p...
Recently, Huang et al. proposed an efficient authenticated key establishment scheme for self-organizing sensor networks. However, in their scheme, a sensor node and a security manager should exchange public-key certificates to authenticate each other. In this paper, we propose an efficient authenticated key establishment scheme which can reduce the communication cost of transmitting public-key ...
To achieve secure data communications, two parties should be authenticated by each other and agree on a secret session key by exchanging messages over an insecure channel. In this paper, based on the bilinear pairing, we present a new two-party authenticated key agreement protocol, and use the techniques from provable security to examine the security of our protocol within Bellare-Rogaway model.
In this paper, we rethink the security of authenticated key agreement and design a new protocol from the practical perspective. Our main focus is on reconsidering the need for real-time checking of random exchange to be in a proper subgroup, and discussing the implication of authenticated key agreement not requiring the subgroup element verification in run time.
NATIONAL PRINTING OFFICE OF MOZAMBIQUE ________________ N O T I C E The material to be published in the «Bulletin of the Republic» must be delivered in the form of a duly authenticated copy, one for each subject, which includes, in addition to the indications necessary to that end, the following, signed and authenticated, note: For publication in the «Bulletin of the Republic». ________________...
This work-in-progress report investigates the problem of authenticated querying in sensor networks. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query was originated by a legitimate entity. I precisely define authenticated querying, analyze the design space for realizing it and propose solutions to this problem in presence of node ca...
This article refers to:RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system
We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g. 15 bits. We call this SAS-based authentication as for authentication based on Short Authenticated Strings. The extra channel uses a weak notion of authentication in which strings cannot be forged nor modified, but whose delive...
We suggest that the proximity of a country to other countries is a factor that affects its choice as an MNE location. We introduce the concept of a country’s proximity to the global distribution of knowledge, markets and resources, and frame this concept as a function of both geographic distance and the worldwide spatial distribution of these factors. We test our location model on a dataset com...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید