نتایج جستجو برای: message authentication
تعداد نتایج: 99488 فیلتر نتایج به سال:
Two parties communicating across an insecure channel need a method by which any attempt to modify the information sent by one to the other, or fake its origin, is detected. Most commonly such a mechanism is based on a shared key between the parties, and in this setting is usually called a MAC, or Message Authentication Code. (Other terms include Integrity Check Value or Cryptographic Checksum)....
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This specification describes how to generate an authentication tag using the UMAC message authentication algorithm. UMAC is designed to be very fast to compute in software on contemporary uniprocessors. Measured spe...
We present a routing protocol with Byzantine robustness and detection. The protocol utilizes a topological map and a packet forwarding mechanism with fault detection. The correctness of the protocol is based on authentication of data and control packets. We also present how such authentication can be done e¢ciently using Message Authentication Codes.
Abstract Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofing and jamming attacks due their signal structures. The Spreading Code Authentication (SCA) technique is one the GNSS message encryption identity authentication techniques. Its robustness complexity in between Message (NMA) Encryption (NME)/Spreading (SCE). A commonly used spreading code inserts unpred...
With the requirement of high speed network protocols, fast message integrity and authentication services are at the top most priority. Currently many integrity techniques, that involve hashing, are being used and developed, but almost every technique faces one or other attack or any other security or performance related issue. The chief problem being faced is the forgery of hash value, being tr...
Copyright Ownership Authentication by Embedding a Biometric Watermark with Discrete Cosine Transform
In respect to the issues on protecting intellectual property, particular for artistic works in electronic form, some sorts of techniques could be put on a copyright material image to ensure its ownership authentication. In this research, signatories’ biometric fingerprint watermark message in digital format will be embedded into a copyright material image by Discrete Cosine Transform (DCT) – on...
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information about the origin of a message. Digital signature schemes reduce transmission costs, because the message is contained in the signature itself and no separate message and signature need be sent again. These schemes are ve...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید