نتایج جستجو برای: authentication protocols
تعداد نتایج: 131388 فیلتر نتایج به سال:
Data and signal authentication schemes are being proposed to address Global Navigation Satellite Systems' (GNSS) vulnerability spoofing. Due the low power of their signals, bandwidth available for in GNSS is scarce. Since delayed-disclosure protocols, e.g., TESLA (timed-efficient stream loss-tolerant authentication), efficient terms robust impairments, they have been implemented by GNSS. The le...
We demonstrate how adversaries with large computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a se...
Authentication and key agreement protocols play an important role in wireless sensor communication networks. Recently Xue et al’. suggested a key agreement protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements.
Mobile device authentication has been a highly active research topic for over 10 years, with vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user strong, systematic, increasingly formal threat models have established are used to qualitatively compare different methods. However, the analysis mobile is often based ...
Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as in tag identification or authentication phase they require a lin...
Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took place. In this study, we construct a fully deniable mutual authentication protocol based on RSA signature, and then a deniable authenticated key exchange protocol is constructed from the proposed protocol.
Parasitic authentication [Ebringer et al., 2000] is a novel approach for user authentication in electronic wallet systems which combines security and usability. We propose an extension to parasitic authentication that integrates it to payment protocols thus increasing the security of electronic wallets. The additional security comes at the expense of greater complexity in the secondary devices ...
There is a long history of authentication protocols designed for ease of human use, which rely on users copying a short string of digits. Historical examples include telex test keys and early nuclear firing codes; familiar modern examples include prepayment meter codes and the 3-digit card verification values used in online shopping. In this paper, we show how security protocols that are design...
Most work on requirements in the area of authentication protocols has concentrated on identifying requirements for the protocol without much consideration of context. Little work has concentrated on assumptions about the environment, for example, the applications that make use of authenticated keys. We will show in this paper how the interaction between a protocol and its environment can have a...
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید