نتایج جستجو برای: authentication and non repudiation

تعداد نتایج: 17010313  

2012
Maria Ortega Sergio Sánchez

This article presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality, integrity and non repudiation.

Journal: :IACR Cryptology ePrint Archive 2008
Sunder Lal Prashant Kushwah

Generalized signcryption is a new cryptographic primitive in which a signcryption scheme can work as an encryption scheme as well as a signature scheme. This paper presents an identity based generalized signcryption scheme based on bilinear pairing and discusses its security for message confidentiality non repudiation and ciphertext authentication.

Journal: :RFC 1998
Blake Ramsdell

S/MIME (Secure/Multipurpose Internet Mail Extensions) provides a consistent way to send and receive secure MIME data. Based on the popular Internet MIME standard, S/MIME provides the following cryptographic security services for electronic messaging applications: authentication, message integrity and non-repudiation of origin (using digital signatures) and privacy and data security (using encry...

2006
Les Green Linas Maknavicius

This document explores the financial system for automatically negotiated service level agreements. Focus is placed on billing and a solution is proposed based on autonomous, negotiating agents. Security, non-repudiation and authentication issues are addressed, along with the role of speculation and aggregation and within the system.

Journal: :Electr. Notes Theor. Comput. Sci. 2000
Riccardo Focardi Roberto Gorrieri Fabio Martinelli

Non Interference 8] has been proposed for modelling and analysing information ow in systems. In 4,7] we have indeed shown that the Non Interference property called NDC can be applied also in the area of network security, for the analysis of typical cryptographic protocol properties (e.g., authentication, non-repudiation). In this paper we extend the results of 4,7] by showing that NDC can be al...

Journal: :ICST Transactions on Ubiquitous Environments 2018

Journal: :Jurnal Sistim Informasi dan Teknologi 2023

The Covid-19 pandemic requires banks to provide electronic payments, carry out digital transformation and open up opportunities for financial technology-based companies. Digital in banking reliable integration security between systems. Otherwise, it can become a gap cyber attacks. Cyber includes Confidentiality, Integrity, Availability, Non-repudiation, Authentication. Jenius is the first bank ...

2002
Moni Naor

Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some applications, it might be undesirable in others. Two related notions of authentication are: Deniable Authentication (see Dwork, Naor and Sahai [25]) and Ring Signatures (see Rivest, Shamir and Tauman [38]). In this paper we show how to combine these notions and achie...

2015
Sonia Thomas Elisabeth Thomas

a broadcast authentication protocol enables the receivers to verify that a received packet was really sent by the claimed sender. Data confidentiality, authenticity, integrity, and non repudiation are basic concerns of securing data delivery over an insecure network. Large and distributed systems with time critical applications require immediate and secure authentication of command and control ...

Journal: :IACR Cryptology ePrint Archive 2006
Goce Jakimoski Yvo Desmedt

When proving the security of a message authentication scheme, the messages are considered to be atomic objects. Straightforward application of such schemes to some information resources may introduce security flaws. Gennaro and Rohatgi (Crypto ’97) identified the streams of data as an important class of information resources that can not be considered to be message-like, and they proposed a sol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید