نتایج جستجو برای: authentication and non repudiation
تعداد نتایج: 17010313 فیلتر نتایج به سال:
This article presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality, integrity and non repudiation.
Generalized signcryption is a new cryptographic primitive in which a signcryption scheme can work as an encryption scheme as well as a signature scheme. This paper presents an identity based generalized signcryption scheme based on bilinear pairing and discusses its security for message confidentiality non repudiation and ciphertext authentication.
S/MIME (Secure/Multipurpose Internet Mail Extensions) provides a consistent way to send and receive secure MIME data. Based on the popular Internet MIME standard, S/MIME provides the following cryptographic security services for electronic messaging applications: authentication, message integrity and non-repudiation of origin (using digital signatures) and privacy and data security (using encry...
This document explores the financial system for automatically negotiated service level agreements. Focus is placed on billing and a solution is proposed based on autonomous, negotiating agents. Security, non-repudiation and authentication issues are addressed, along with the role of speculation and aggregation and within the system.
Non Interference 8] has been proposed for modelling and analysing information ow in systems. In 4,7] we have indeed shown that the Non Interference property called NDC can be applied also in the area of network security, for the analysis of typical cryptographic protocol properties (e.g., authentication, non-repudiation). In this paper we extend the results of 4,7] by showing that NDC can be al...
The Covid-19 pandemic requires banks to provide electronic payments, carry out digital transformation and open up opportunities for financial technology-based companies. Digital in banking reliable integration security between systems. Otherwise, it can become a gap cyber attacks. Cyber includes Confidentiality, Integrity, Availability, Non-repudiation, Authentication. Jenius is the first bank ...
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some applications, it might be undesirable in others. Two related notions of authentication are: Deniable Authentication (see Dwork, Naor and Sahai [25]) and Ring Signatures (see Rivest, Shamir and Tauman [38]). In this paper we show how to combine these notions and achie...
a broadcast authentication protocol enables the receivers to verify that a received packet was really sent by the claimed sender. Data confidentiality, authenticity, integrity, and non repudiation are basic concerns of securing data delivery over an insecure network. Large and distributed systems with time critical applications require immediate and secure authentication of command and control ...
When proving the security of a message authentication scheme, the messages are considered to be atomic objects. Straightforward application of such schemes to some information resources may introduce security flaws. Gennaro and Rohatgi (Crypto ’97) identified the streams of data as an important class of information resources that can not be considered to be message-like, and they proposed a sol...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید