نتایج جستجو برای: identification key
تعداد نتایج: 936593 فیلتر نتایج به سال:
چکیده : نظام انتخاباتی قواعد و چار چوب های به رسمیت شناخته شده ای است که بیانگر چگونگی تبدیل آرای مردم به مناصب و پست های سیاسی است. این نظام انتخابات باید به گونه ای عمل کند که نتیجه آن فراهم شدن مکانیسم و ساز و کار مطلوب و مناسب برای برگزاری انتخابات سالم و رقابتی باشد. به نظر می رسد نظام انتخاباتی جمهوری اسلامی ایران دارای ضعف ها و نواقصی است که به سبب آن ها نمی توان انتخابات مطلوب را برگزا...
HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the learning parity with noise (LPN) problem, which was proven to be NP-hard. The best known attack on LPN by Levieil and Fouque [13] requires subexponential number of samples and sub-exponential n...
AbstrucfIn 1984, Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communica...
This paper describes an identification and authentication protocol for RFID tags with two contributions aiming at enhancing the security and privacy of RFID based systems. First, we assume that some of the servers storing the information related to the tags can be compromised. In order to protect the tags from potentially malicious servers, we devise a technique that makes RFID identification s...
The HB problem first introduced by Blum and Hopper has been the basis for extremely lightweight authentication protocols for RFID tags [18, 19]. In this paper we introduce a variant of this problem which we call the strong HB problem. We analyze the strong HB problem and give some arguments that support its hardness. We then use the strong HB assumption in two applications of independent intere...
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed against HB ineffective. Based on the fact that there has been no pa...
Automated fingerprint identification system has an increasingly important role in modern times. This study presents the steps of the automated fingerprint identification system and presents an application for fingerprint identification and system's equal error rate evaluation. The algorithm for fingerprint image enhancement is a key element of the system. A fingerprint image can be damaged, dam...
Traditional authentication and key establishment protocols utilize nonce parameters as a means for message freshness, recent aliveness, and key derivation. Improving identity verification, increasing key space, or making secret updates more complex through nonces are not goals. Generating random numbers as nonces and not making the most out of them can be considered as a loss in resource strick...
We present a concept for the realization of asymmetric cryptographic techniques in light-weight cryptographic devices and describe an implementation based on elliptic curve cryptography which can be used for authentication in mass applications of RFID tags. Our schemes offer advantages in large decentralized applications with many unobservable readers in the field over previous solutions. Moreo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید