نتایج جستجو برای: authentication protocols

تعداد نتایج: 131388  

Journal: :IEEE Transactions on Aerospace and Electronic Systems 2021

Data and signal authentication schemes are being proposed to address Global Navigation Satellite Systems' (GNSS) vulnerability spoofing. Due the low power of their signals, bandwidth available for in GNSS is scarce. Since delayed-disclosure protocols, e.g., TESLA (timed-efficient stream loss-tolerant authentication), efficient terms robust impairments, they have been implemented by GNSS. The le...

Journal: :Quantum Information Processing 2016
Christoph Pacher Aysajan Abidin Thomas Lorünser Momtchil Peev Rupert Ursin Anton Zeilinger Jan-Åke Larsson

We demonstrate how adversaries with large computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a se...

Journal: :IACR Cryptology ePrint Archive 2013
Majid Bayat Mohammad Reza Aref

Authentication and key agreement protocols play an important role in wireless sensor communication networks. Recently Xue et al’. suggested a key agreement protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements.

Journal: :ACM Computing Surveys 2021

Mobile device authentication has been a highly active research topic for over 10 years, with vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user strong, systematic, increasingly formal threat models have established are used to qualitatively compare different methods. However, the analysis mobile is often based ...

Journal: :Wireless Personal Communications 2010
Imran Erguler Emin Anarim

Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as in tag identification or authentication phase they require a lin...

Journal: :IACR Cryptology ePrint Archive 2013
Xi Jun Lin Lin Sun

Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took place. In this study, we construct a fully deniable mutual authentication protocol based on RSA signature, and then a deniable authenticated key exchange protocol is constructed from the proposed protocol.

2001
Lucas C. Ferreira Ricardo Dahab

Parasitic authentication [Ebringer et al., 2000] is a novel approach for user authentication in electronic wallet systems which combines security and usability. We propose an extension to parasitic authentication that integrates it to payment protocols thus increasing the security of electronic wallets. The additional security comes at the expense of greater complexity in the secondary devices ...

2016
Khaled Baqer S. Johann Bezuidenhoudt Ross J. Anderson Markus G. Kuhn

There is a long history of authentication protocols designed for ease of human use, which rely on users copying a short string of digits. Historical examples include telex test keys and early nuclear firing codes; familiar modern examples include prepayment meter codes and the 3-digit card verification values used in online shopping. In this paper, we show how security protocols that are design...

2002
Ran Canetti Catherine Meadows Paul Syverson

Most work on requirements in the area of authentication protocols has concentrated on identifying requirements for the protocol without much consideration of context. Little work has concentrated on assumptions about the environment, for example, the applications that make use of authenticated keys. We will show in this paper how the interaction between a protocol and its environment can have a...

Journal: :CoRR 2005
Sam Bretheim

We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید