نتایج جستجو برای: authentication protocol

تعداد نتایج: 275892  

Journal: :RFC 2012
Sam Hartman T. Charles Clancy Katrin Hoeper

This document defines how to implement channel bindings for Extensible Authentication Protocol (EAP) methods to address the "lying Network Access Service (NAS)" problem as well as the "lying provider" problem.

2010
Craig Pearce Vincent Yin - Man Ma Peter Bertok

Security in wireless sensor networks is required for trust in collected data, however, resource limitations have made the security need of secondary importance. This paper proposes a new application-layer SPKI/SDSI protocol that provides secure communications, authentication and fast re-authentication. The protocol has been formally proven secure and results indicate the protocol to be suitable...

Journal: :Journal of Computer Security 1998
Günther Horn Bart Preneel

This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper also demonstrates how a micropayment scheme can be integrated into the authentication protocol; this payment protocol allows for the provision of incontestable charging. The problem of establishing authenticated public keys thro...

Journal: :Inf. Sci. 2007
Wei-Bin Lee Chia Chun Wu Woei-Jiunn Tsaur

A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently, many interactive and non-interactive deniable authentication protocols have been proposed. However, the interactive manner makes deniable ...

Journal: :IACR Cryptology ePrint Archive 2010
Jesse Walker Jiangtao Li

Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, we show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared key between them. We propose a modification to the SIGMA key exch...

2012
Jens Bender Özgür Dagdelen Marc Fischlin Dennis Kügler

We discuss an efficient combination of the cryptographic protocols adopted by the International Civil Aviation Organization (ICAO) for securing the communication of machine readable travel documents and readers. Roughly, in the original protocol the parties first run the Password-Authenticated Connection Establishment (PACE) protocol to establish a shared key and then the reader (optionally) in...

Journal: :Computer Communications 2005
Yacine Challal Abdelmadjid Bouabdallah Yoann Hinard

Securing the multicast communication model is a strategic requirement for effective deployment of large scale business multi-party applications (TV over Internet, Video-on-Demand (VoD), video-conferencing, interactive group games, .). One of the main issues in securing multicast communication is the authentication service; a keystone of every secure architecture. Even though several authenticat...

2014

Vehicular ad hoc networks (VANETs) adopt the Expedite Message Authentication Protocol (EMAP) and Certificate Revocation Lists (CRLs) for their security. In any EMAP system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper,...

Journal: :Security and Communication Networks 2014
Fengtong Wen Willy Susilo Guomin Yang

Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart card-based anonymous user authentication protocol for wireless communications. The scheme can protect user privacy and is believed to be secure against a range of network attacks even if the secret information stored in the smart card is compromised. In this pa...

2014
Aysajan Abidin Kanta Matsuura Aikaterini Mitrokotsa

Biometric authentication establishes the identity of an individual based on biometric templates (e.g. fingerprints, retina scans etc.). Although biometric authentication has important advantages and many applications, it also raises serious security and privacy concerns. Here, we investigate a biometric authentication protocol that has been proposed by Bringer et al. and adopts a distributed ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید