نتایج جستجو برای: authentication protocols
تعداد نتایج: 131388 فیلتر نتایج به سال:
Context. Security protocols are distributed programs that aim at ensuring security properties, such as confidentiality, authentication or anonymity, by the means of cryptography. Such protocols are widely deployed, e.g., for electronic commerce on the Internet, in banking networks, mobile phones and more recently electronic elections. As properties need to be ensured, even if the protocol is ex...
Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper closely examines the currently available key distributions protocols, their strengths and lim...
Radio Frequency Identification (RFID) is a technology designed to automatically identify a myriad of everyday objects and people. Due to widely spread of the RFID applications, some useful message can be attacked by adversaries. Thus, to eliminate the security problem, the security requirements for privacy-preserving RFID authentication protocols are evident. In this paper, we discuss unique ma...
With the emergence of numerous distributed services, the importance of electronic authentication in networks is rapidly increasing. Since more than a decade, authentication protocols have been proposed and discussed. Because of various flaws which were found late, Burrows, Abadi and Needham [BAN] created a logic of authentication to formally verify authentication protocols by the end of the 80’...
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted third parties, but rather using a minimum of work by human user(s) implementing the low-bandwidth unspoofable channels between them. We develop both pairwise and group protocols which are essentially optimal in human effor...
One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authenticate tags but also protect these latter from privacy-violating attacks, ensuring their anonymity and untraceability: an adversary should not be able to get any information that would reveal the identity of a tag or would be u...
Research works on the analysis and the development of authentication protocols frequently adopt the linear software development approach and are based on certain non-extensible assumptions (Tobler and Hutchison 2004), (Grob 2003), (Harbitter and Menasce 2002). This paper is part of an ongoing work regarding the development of a pre-emptive security mechanism for networks and distributed systems...
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is ...
User mobility is a feature that raises many new security-related issues and concerns. One of them is the disclosure of a mobile user's identity during the authentication process, or other procedures speciic to mobile networks. Such disclosure allows an unauthorized third-party to track the mobile user's movements and current whereabouts. Depending on the context, access to any information relat...
rganizations needed a way to unify authentication systems in the enterprise for easier management and better security. Single-sign-on was widely adopted and provided a solution for keeping one repository of usernames and passwords that could be used transparently across several internal applications. After analyzing various issues regarding authentication of user’s in federated systems we have ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید