نتایج جستجو برای: authentication and non repudiation
تعداد نتایج: 17010313 فیلتر نتایج به سال:
although there are studies on pragmatic assessment, to date, literature has been almost silent about native and non-native english raters’ criteria for the assessment of efl learners’ pragmatic performance. focusing on this topic, this study pursued four purposes. the first one was to find criteria for rating the speech acts of apology and refusal in l2 by native and non-native english teachers...
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad (MANET) and critical infrastructure to provide passengers with wide range safety applications. VANETs increasingly common nowadays because it is connecting invisible services. The security paramount their future use must not jeopardize users' privacy. these essential for the benefit secure effective solutions f...
We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing ...
the present study investigated construct equivalence of multiple choice (mc) and constructed response (cr) item types across stem and content equivalent mc and cr items (item type ‘a’), non-stem-equivalent but content equivalent mc and cr items (item type ‘b’), and non-stem and non-content equivalent mc and cr items (item type ‘c’). one hundred seventy english-major undergraduates completed mc ...
Securing the multicast communication model is a strategic requirement for effective deployment of large scale business multi-party applications (TV over Internet, Video-on-Demand (VoD), video-conferencing, interactive group games, .). One of the main issues in securing multicast communication is the authentication service; a keystone of every secure architecture. Even though several authenticat...
Considering the current dependency on digital technology in modern society, protection of multimedia is highly important. Encryption vital communication, ensuring data confidentiality, authentication, integrity, and non-repudiation. Multimedia encryption-based security techniques are becoming increasingly important as they allow for secure sharing content platforms. This survey aims to review s...
Diameter standard authentication system does not provide mutual authentication and non-repudiation. AAA authentication system using public key was suggested to supplement such Diameter authentication but application in mobile service control nodes is difficult due to overhead of communication and arithmetic. ID based AAA authentication system was suggested to overcome such weak point but it sti...
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. ABSTRACT The IDUP-GSS-API extends the GSS-API [RFC-2078] for applications requiring protection of a generic data unit (such as a file or message) in a way which is independent of the protection of any other data unit and ind...
In this paper we discuss progress in the development of Application Program Interfaces (APIs) and mechanisms which provide a comprehensive set of security services to application developers. The APIs, though similar, are designed for distinct environments: the session API (“GSS”) is aimed at the on-line real-time messaging environment; the store-and-forward API (“IDUP”) is particularly suited t...
The popularity of mobile platforms makes them a good candidate for electronic payment. However, there are challenges in this field such as privacy protection, security, the bandwidth limitations of mobile networks, and the limited capabilities of mobile devices. Traditional e-commerce payment protocols were designed to keep track of traditional flows of data, are vulnerable to attacks and are n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید