نتایج جستجو برای: message authentication

تعداد نتایج: 99488  

Journal: :Ukrainian Information Security Research Journal 2014

Journal: :International Journal of Computer Applications 2013

Journal: :International Journal of Computer Applications 2015

1996
Mihir Bellare Ran Canetti Hugo Krawczyk

Two parties communicating across an insecure channel need a method by which any attempt to modify the information sent by one to the other, or fake its origin, is detected. Most commonly such a mechanism is based on a shared key between the parties, and in this setting is usually called a MAC, or Message Authentication Code. (Other terms include Integrity Check Value or Cryptographic Checksum)....

Journal: :RFC 2006
Ted Krovetz

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This specification describes how to generate an authentication tag using the UMAC message authentication algorithm. UMAC is designed to be very fast to compute in software on contemporary uniprocessors. Measured spe...

2003
Ioannis C. Avramopoulos Hisashi Kobayashi Randolph Y. Wang

We present a routing protocol with Byzantine robustness and detection. The protocol utilizes a topological map and a packet forwarding mechanism with fault detection. The correctness of the protocol is based on authentication of data and control packets. We also present how such authentication can be done e¢ciently using Message Authentication Codes.

Journal: :Satellite Navigation 2021

Abstract Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofing and jamming attacks due their signal structures. The Spreading Code Authentication (SCA) technique is one the GNSS message encryption identity authentication techniques. Its robustness complexity in between Message (NMA) Encryption (NME)/Spreading (SCE). A commonly used spreading code inserts unpred...

2012
Richa Purohit Yogendra Singh Upendra Mishra Abhay Bansal

With the requirement of high speed network protocols, fast message integrity and authentication services are at the top most priority. Currently many integrity techniques, that involve hashing, are being used and developed, but almost every technique faces one or other attack or any other security or performance related issue. The chief problem being faced is the forgery of hash value, being tr...

2009
Ioi-Tun Lam

In respect to the issues on protecting intellectual property, particular for artistic works in electronic form, some sorts of techniques could be put on a copyright material image to ensure its ownership authentication. In this research, signatories’ biometric fingerprint watermark message in digital format will be embedded into a copyright material image by Discrete Cosine Transform (DCT) – on...

Journal: :I. J. Network Security 2011
R. Rajaram Ramasamy M. Amutha Prabakar

Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information about the origin of a message. Digital signature schemes reduce transmission costs, because the message is contained in the signature itself and no separate message and signature need be sent again. These schemes are ve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید