نتایج جستجو برای: authenticated

تعداد نتایج: 4119  

Journal: :Communications of the Korean Mathematical Society 2005

Journal: :ITM web of conferences 2021

The prominent mode of transportation being used by the public is roadways. Increased usage roadways may lead to many accidents and thefts. major reason violation rules drafted for driving causing mainly youngsters who does not have a proper knowledge license. So this proposed system has some restrictions follow higher safe security, License scanned means NFC tag. When it read reader, Node MCU p...

2007
Yong Ho Kim Hwaseong Lee Jong Hyuk Park Laurence T. Yang Dong Hoon Lee

Recently, Huang et al. proposed an efficient authenticated key establishment scheme for self-organizing sensor networks. However, in their scheme, a sensor node and a security manager should exchange public-key certificates to authenticate each other. In this paper, we propose an efficient authenticated key establishment scheme which can reduce the communication cost of transmitting public-key ...

Journal: :IACR Cryptology ePrint Archive 2005
Rongxing Lu Zhenfu Cao Renwang Su Jun Shao

To achieve secure data communications, two parties should be authenticated by each other and agree on a secret session key by exchanging messages over an insecure channel. In this paper, based on the bilinear pairing, we present a new two-party authenticated key agreement protocol, and use the techniques from provable security to examine the security of our protocol within Bellare-Rogaway model.

2005
Taekyoung Kwon

In this paper, we rethink the security of authenticated key agreement and design a new protocol from the practical perspective. Our main focus is on reconsidering the need for real-time checking of random exchange to be in a proper subgroup, and discussing the implication of authenticated key agreement not requiring the subgroup element verification in run time.

2009

NATIONAL PRINTING OFFICE OF MOZAMBIQUE ________________ N O T I C E The material to be published in the «Bulletin of the Republic» must be delivered in the form of a duly authenticated copy, one for each subject, which includes, in addition to the indications necessary to that end, the following, signed and authenticated, note: For publication in the «Bulletin of the Republic». ________________...

2005
Zinaida Benenson

This work-in-progress report investigates the problem of authenticated querying in sensor networks. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query was originated by a legitimate entity. I precisely define authenticated querying, analyze the design space for realizing it and propose solutions to this problem in presence of node ca...

Journal: :Connection Science 2021

This article refers to:RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system

2005
Serge Vaudenay

We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g. 15 bits. We call this SAS-based authentication as for authentication based on Short Authenticated Strings. The extra channel uses a weak notion of authentication in which strings cannot be forged nor modified, but whose delive...

Journal: :Management Science 2008
Lilach Nachum Srilata Zaheer Shulamith Gross

We suggest that the proximity of a country to other countries is a factor that affects its choice as an MNE location. We introduce the concept of a country’s proximity to the global distribution of knowledge, markets and resources, and frame this concept as a function of both geographic distance and the worldwide spatial distribution of these factors. We test our location model on a dataset com...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید