نتایج جستجو برای: security protocols

تعداد نتایج: 267913  

Journal: :JCM 2011
Chao Yang Jianfeng Ma Xuewen Dong

Till today, the study of performance of security protocols of WLAN has been one of research focuses. Whereas, owing to enormous complexity and low efficiency of modeling security protocols, there has been by now no uniform method or technology that can be used generally to simulate and evaluate security protocols, and no simulation system available that can well support research on performance ...

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

Journal: :journal of advances in computer research 2014
gholamreza vatanian shanjani somayyeh jafarali jassbi

for last years, the evolution of new issues has incited a great development of the transportation system. in this paper, we discuss ingredients of its (intelligent transportation system) that are inter-vehicle communication (ivc) or what can call vehicular ad hoc networks (vanet), which are special type of manet. we will survey the main issues relevant to vanet in detail with providing a concep...

Journal: :Wireless Personal Communications 2011
Tobias Heer Óscar García-Morchón René Hummen Sye Loong Keoh Sandeep S. Kumar Klaus Wehrle

A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and li...

2009
Anca Jurcut Tom Coffey Reiner Dojen Robert Gyorodi

Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are...

2010
Orhun Kara Süleyman Kardas Muhammed Ali Bingöl Gildas Avoine

In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-PCD) protocols where each response bit depends on the ...

F. Naji Mohades M. H. Yaghmaee Moghadam

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

Journal: :IACR Cryptology ePrint Archive 2006
Mark Manulis

In this paper we overview a large number of currently known group key exchange protocols while focusing on the protocols designed for more than three participants (for an overview of twoand three-party key exchange protocols we refer to [BM03, DB05c]). For each mentioned protocol we briefly describe the current state of security based on the original analysis as well as later results appeared i...

2015
Ali Kassem

Security is a crucial requirement in the applications based on information and communication technology, especially when an open network such as the Internet is used. To ensure security in such applications several security protocols have been developed. However, the design of complex security protocols is notoriously difficult and error-prone. Several flaws have been found on protocols that ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید