نتایج جستجو برای: security protocols

تعداد نتایج: 267913  

Journal: :International Journal of Autonomic Computing 2010

2010
ABDUL GHAFOOR

In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on wellestablished security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications...

2007
Véronique Cortier Jérémie Delaitre Stéphanie Delaune

Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or l...

1996
Erich M. Nahum David J. Yates Sean W. O'Malley Hilarie K. Orman Richard Schroeppel

Security and privacy are growing concerns in the Internet community, due to the Internet’s rapid growth and the desire to conduct business over it safely. This desire has led to the advent of several proposals for security standards, such as secure IP, secure HTTP, and the Secure Socket Layer. All of these standards propose using cryptographic protocols such as DES and RSA. Thus, the need to us...

Journal: :amirkabir international journal of modeling, identification, simulation & control 2014
f. naji mohades m. h. yaghmaee moghadam

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...

Journal: :Electronic Notes in Theoretical Computer Science 2006

Journal: :Communications of the ACM 2003

Journal: :International Journal of Computer Applications 2011

2013
Miaolei Deng Weijun Zhu

The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید