نتایج جستجو برای: message authentication
تعداد نتایج: 99488 فیلتر نتایج به سال:
SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless environments, the efficiency of security service is one of the important matters in question. Therefore, we w...
Given the enormous interest shown by customers as well industry in autonomous vehicles, concept of Internet Vehicles (IoV) has evolved from Vehicular Ad hoc NETworks (VANETs). VANETs are likely to play an important role Intelligent Transportation Systems (ITS). based on fixed infrastructures, called Road Side Units (RSUs), have been extensively studied. Efficient, authenticated message dissemin...
Source Anonymous Message authentication (SAMA) is one of the most effective ways to prevent unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).A scalable authentication scheme based on elliptic curve cryptography (ECC) is introduced to allow any node to transmit an unlimited number of messages without suffering the threshold problem and provides message ...
SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless environments, the efficiency of security service is one of the important matters in question. For the such ef...
One of the critical challenges in dynamic spectrum sharing (DSS) is identifying non-conforming transmitters that violate spectrum access rules prescribed by a spectrum regulatory authority. One approach for facilitating identification of the transmitters in DSS is to require every transmitter to embed an uniquely-identifiable authentication signal in its waveform at the PHY-layer. In most of th...
Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify authenticity of the received message. In this paper, two constructions of multireceiver authentication codes from singular symplectic geometry over finite fields are given. The parameters and the probabilities of success for different types of dec...
Route identification and digital signature has been considered in Mobile Ad hoc NETwork (MANET) for efficient message broadcasting. The integrity and authenticity through acknowledgement packets, forged acknowledgment attack is not possible due to dynamic traffics. In addition, the route identification usually filters out newly observed polluted nodes through digital signature scheme. Thus, the...
Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of ...
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
In this paper, we present how to find nearly optimal positions for embedding authentication message by Genetic Algorithm (GA), so as to achieve high quality protected image in image authentication problem. Correlations between important DCT coefficients and user defined thresholds constitute the image authentication message. The embedding positions are simulated as chromosomes and we use GA ope...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید