نتایج جستجو برای: authentication protocol

تعداد نتایج: 275892  

2003
Chiara Bodei Pierpaolo Degano Riccardo Focardi Corrado Priami

We advocate here the use of two authentication primitives we recently propose in a calculus for distributed systems, as a further instrument for programmers interested in authentication. These primitives offer a way of abstracting from various specifications of authentication and obtaining idealized protocols “secure by construction”. We can consequently prove that a cryptographic protocol is t...

Journal: :JNW 2012
Jingjun Miao Liangmin Wang

Mobile nodes in the Internet of things often move from one cluster to another, in which cryptography based protocols are required to provide rapid identification authentication and privacy protection. A single-step protocol was presented for the occasion that the mobile node joins a new cluster. The presented protocol contains a valid request message and an answer authentication message, which ...

2013
Clifton Mulkey Dulal Kar Ajay Katangur

We envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resourceconstrained tiny nodes. However, the existing Wireless Protected Access (WPA) protocol may not be suitable for such resourceconstrained, low-end nodes as the protocol could be too demanding since its existing authen...

2013
Minha Park Yeog Kim Okyeon Yi

Many people demand more convenience and smarter service. Due to demand, smart devices have begun to take center stage in terms of portability and functionality in wireless environments, especially mobile communications. To provide secure service, authentication between networks and users’ devices is necessary with proper efficiency. In this paper, we propose an advanced authentication protocol ...

2010
Kyusuk Han Kwangjo Kim Taeshik Shon

Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authentication and tracing the node movement. However, current security researches on WSN are insufficient to support such environments since their designs only considered the static environments. In this paper, we propose the efficient node authentication and key exchange protocol that reduces the overh...

2014
Younsung Choi Donghoon Lee Jiye Kim Jaewook Jung Junghyun Nam Dongho Won

Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first prop...

Journal: :JSW 2014
Qingqi Pei Jie Yu

In the current Internet world, most of the Internet services are based on the single server model and use the password identity authentication to provide application service for the users, this means that the user must enter the identity and password, before his/her wants to login in the application service server. It is extremely hard for user to remember the different ID and password, so the ...

2011
K Hemanth Srinivasulu Asadi

Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the c...

1996
Shyhtsun F. Wu

Network-layer authentication security services are typically pessimistic and static. A conservative IP security gateway checks/veriies the authentication information for every packet it forwards. This implies that, even there is no bad guy in the network, the authentication check is still performed for every packet. In this paper, we examine a sleepy approach, where the gateways normally do not...

2001
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). The mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and encryption keys of greater strength than the indiv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید