نتایج جستجو برای: authentication protocol

تعداد نتایج: 275892  

1999
D Simon

The EAP-TLS Authentication Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstr...

Journal: :J. Inf. Sci. Eng. 2015
Iksu Kim Yongyun Cho

Until now, although many researchers proposed a variety of authentication protocol to verify the identity of the clients, most of these protocols are inefficient and ineffective. Gouda et al. proposed an anti-phishing single password protocol, but it is vulnerable to pharming attacks. In this paper, we show that the protocol is insecure, and propose a hash-based password authentication protocol...

Journal: :Journal of Systems and Software 2006
Qiang Tang Chris J. Mitchell

In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, namely the intra-domain authentication protocol and the inter-domain authentication protocol, which are used depending on whether the user and the request service are located in the same domain. We show that both sub-prot...

Journal: :IACR Cryptology ePrint Archive 2013
Xi Jun Lin Lin Sun

Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took place. In this study, we construct a fully deniable mutual authentication protocol based on RSA signature, and then a deniable authenticated key exchange protocol is constructed from the proposed protocol.

1999

PPP EAP TLS Authentication Protocol Status of this Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. 1. Abstract The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams ove...

2013
Heba K. Aslan

Mobile WiMAX (Worldwide Interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video conference. In the present paper, we...

Journal: :International Journal of Communication Networks and Security 2012

Journal: :CoRR 2010
V. Ruckmani G. Sudha Sadasivam

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multi-domain. Authentication remains as the signi...

2017
Muhammad Bilal Shin-Gak Kang

Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exc...

Journal: :JNW 2014
Aihan Yin Hongchao Liang Ming Zhu

In this paper, we propose a new bidirectional authentication and key agreement protocol based on the MYK-NTRUSign signature algorithm. The AES encryption algorithm and hash techniques were adopted to build our protocol. To implement the mutual authentication and session key agreement, the proposed protocol includes two phases: namely initial phase and mutual authentication with key agreement ph...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید