نتایج جستجو برای: identification key

تعداد نتایج: 936593  

Journal: :Acta Phytopathologica et Entomologica Hungarica 2000

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده حقوق و علوم سیاسی 1390

چکیده : نظام انتخاباتی قواعد و چار چوب های به رسمیت شناخته شده ای است که بیانگر چگونگی تبدیل آرای مردم به مناصب و پست های سیاسی است. این نظام انتخابات باید به گونه ای عمل کند که نتیجه آن فراهم شدن مکانیسم و ساز و کار مطلوب و مناسب برای برگزاری انتخابات سالم و رقابتی باشد. به نظر می رسد نظام انتخاباتی جمهوری اسلامی ایران دارای ضعف ها و نواقصی است که به سبب آن ها نمی توان انتخابات مطلوب را برگزا...

Journal: :IACR Cryptology ePrint Archive 2008
Zbigniew Golebiewski Krzysztof Majcher Filip Zagórski Marcin Zawada

HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the learning parity with noise (LPN) problem, which was proven to be NP-hard. The best known attack on LPN by Levieil and Fouque [13] requires subexponential number of samples and sub-exponential n...

Journal: :IEEE Journal on Selected Areas in Communications 1993
Lein Harn Shoubao Yang

AbstrucfIn 1984, Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communica...

2007
Roberto Di Pietro Refik Molva

This paper describes an identification and authentication protocol for RFID tags with two contributions aiming at enhancing the security and privacy of RFID based systems. First, we assume that some of the servers storing the information related to the tags can be compromised. In order to protect the tags from potentially malicious servers, we devise a technique that makes RFID identification s...

2009

The HB problem first introduced by Blum and Hopper has been the basis for extremely lightweight authentication protocols for RFID tags [18, 19]. In this paper we introduce a variant of this problem which we call the strong HB problem. We analyze the strong HB problem and give some arguments that support its hardness. We then use the strong HB assumption in two applications of independent intere...

2012
Mohammad Reza Sohizadeh Abyaneh

As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed against HB ineffective. Based on the fact that there has been no pa...

2013
Marko Kočevar Zdravko Kačič

Automated fingerprint identification system has an increasingly important role in modern times. This study presents the steps of the automated fingerprint identification system and presents an application for fingerprint identification and system's equal error rate evaluation. The algorithm for fingerprint image enhancement is a key element of the system. A fingerprint image can be damaged, dam...

2013
Gökhan DALKILIÇ Mehmet Hilal ÖZCANHAN Hafize Şen

Traditional authentication and key establishment protocols utilize nonce parameters as a means for message freshness, recent aliveness, and key derivation. Improving identity verification, increasing key space, or making secret updates more complex through nonces are not goals. Generating random numbers as nonces and not making the most out of them can be considered as a loss in resource strick...

2008
Michael Braun Erwin Hess Bernd Meyer

We present a concept for the realization of asymmetric cryptographic techniques in light-weight cryptographic devices and describe an implementation based on elliptic curve cryptography which can be used for authentication in mass applications of RFID tags. Our schemes offer advantages in large decentralized applications with many unobservable readers in the field over previous solutions. Moreo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید