نتایج جستجو برای: authentication protocol

تعداد نتایج: 275892  

Journal: :RFC 2013
Julien Bournelle Lionel Morand Sebastien Decugis Qin Wu Glen Zorn

The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...

Journal: :EURASIP J. Wireless Comm. and Networking 2006
Ja'afer Al-Saraireh Sufian Yousef

This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected respon...

2007
Shahabuddin Muhammad Zeeshan Furqan Ratan K. Guha

Recently a Distributed Temporal Protocol Logic has been devised to capture reasoning in the distributed environment of security protocols. Elsewhere we have constructed a proof-based verification framework using distributed temporal protocol logic to verify the authentication property of security protocols. In this paper, we apply our verification framework to a well-known protocol. In particul...

2011
Esam A. A. Hagras Maha Amer Hazem H. Aly

In this paper, we propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the user identity privacy, mutual authentication, nonrepudiation. This study also pr...

2011
Anthony Van Herrewege Dave Singelee Ingrid Verbauwhede

The Controller-Area Network (CAN) bus protocol [1] is a bus protocol invented in 1986 by Robert Bosch GmbH, originally intended for automotive use. By now, the bus can be found in devices ranging from cars and trucks, over lightning setups to industrial looms. Due to its nature, it is a system very much focused on safety, i.e., reliability. Unfortunately, there is no build-in way to enforce sec...

Journal: :IACR Cryptology ePrint Archive 2007
Nam-Su Jho Myung-Hwan Kim Dowon Hong Byung-Gil Lee

⎯ A key agreement protocol is a cryptographical primitive which allows participants to share a common secret key via insecure channel. In particular, a multiparty key agreement protocol is a key agreement protocol that can manage arbitrary number of participants at once. In the security point of view, authentication and forward secrecy are the most important requirements in such protocols. One ...

2006
Xiaoyu Li Dexi Zhang

In this paper we provide a quantum authentication protocol. The two parties share a sequence of EPR(Einstein-Podolsky-Rosen) pairs as the authentication key. To authenticate each other, one party creates auxiliary qubits and make them interact with the authentication key. After measurement in selected basis, he or she affirm the other’s identity. We shown that no one without the authentication ...

Journal: :CoRR 2015
Seyed Salman Sajjadi GhaemMaghami Mahtab Mirmohseni Afrooz Haghbin

Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed S...

2007
M. Newlin Rajkumar Yu-Lun Huang

Wireless Networks provide more flexibility and connectivity to the users, to be connected with anyone, any time, any where. This feature makes the wireless networks to be wide open to threats and attacks by the intruders. To ensure a reliable and secure wireless environment, suitable authentication protocols have to be employed based on the network infrastructure. The scope of this thesis is to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید