نتایج جستجو برای: message authentication

تعداد نتایج: 99488  

Journal: :IACR Cryptology ePrint Archive 2005
Mahalingam Ramkumar

We introduce a novel cryptographic paradigm of broadcast authentication with “preferred” verifiers (BAP). With BAP, the message source explicitly targets a set of one or more verifiers. For an attacker, forging authentication data of a source, for purposes of fooling preferred verifiers may be substantially more difficult than fooling other (non-preferred) verifiers. We investigate broadcast au...

Journal: :CoRR 2012
Nabin Ghoshal J. K. Mandal

In this paper a novel data embedding technique in frequency domain has been proposed using Discrete Fourier Transform (DFT) for image authentication and secured message transmission based on hiding a large volume of data into gray images. Image authentication is done by embedding message/image in frequency domain by choosing image blocks of size 2 × 2, called mask, from the source image in row ...

2007
Patrick Schaller Srdjan Capkun David A. Basin

We present two broadcast authentication protocols based on delayed key disclosure. Our protocols rely on symmetric-key cryptographic primitives and use cryptographic puzzles to provide efficient broadcast authentication in different application scenarios, including those with resource-constrained wireless devices such as sensor nodes. The strong points of the protocols proposed are that one all...

1998
Reihaneh Safavi-Naini Huaxiong Wang

Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, we give a formal deenition of multireceiver authentication codes, derive information theoretic and combinatorial lower bounds on their performance and give new eecient constructions for such cod...

Journal: :I. J. Network Security 2005
Hsien-Chu Wu Chi-Yu Liu Shu-Fen Chiou

User authentication is a most important protocol in a distribution network. Those authentication schemes have been proposed for many years, and a one-time password authentication scheme is one of them. In 2004, Lin and Chang proposed a one-time password authentication scheme which is free from replay attacks, server spoofing attacks, off-line dictionary attacks, active attacks, and revelation o...

2010
Mukesh Kumar Jha T. P. Sharma

In this paper, we have proposed a secure data aggregation protocol for wireless sensor networks (WSNs) that is robust to deceitful nodes. The goal of this protocol is to guarantee the essential security needs (like source authentication, data confidentiality & data integrity) as well as to achieve low communication overhead and be fitted with various aggregation functions (like sum, average, ma...

2015
M .Srilatha

In the present computer era and advancement in mobile communication system where many applications rely on the existence of small devices and small applications which exchange data in any communication networks challenging is to provide security where the significant portion of applications is based on the confidentiality and integrity of messages that are communicated by short encrypted messag...

2009
Khaled S. Alghathbar Alaaeldin M. Hafez

Integrity and authentication of long-term stored information are important issues that should be considered in secure storage systems. Digital archived information may include different types of objects with different representation, such as, documents, images and database tables. Authenticity of such information should be verified, especially when it transferred through communication channels....

2011
S. Malarkan Dr. C. Ramesh

With the wide applications of wireless communication in the air inter-face, needs secure connections, efficient decryption and strong authentication mechanisms. In general,authentication procedure adds extra messages to the original message flow and results in throughput reduction/ increase in processing time. Reducing the processing time spent on authentication procedure is very important for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید