• No results found

authentication and revocation

Tree Based Revocation for Certificateless Authentication in Vehicular Ad Hoc  Networks

Tree Based Revocation for Certificateless Authentication in Vehicular Ad Hoc Networks

... is authentication, involving an efficient management of both valid and invalid public ...certificateless authentication, what increases efficiency and security in vehicular ...of revocation ...

8

Revocation List Maintenance And Secured Authentication For Mobile Users In A Mobile Network

Revocation List Maintenance And Secured Authentication For Mobile Users In A Mobile Network

... updated revocation function. We proposed ECDH based anonymous authentication roaming protocol that supports efficient revocation of naturally expired ...the revocation list since the ...

7

Preserving Forward Security Authentication with User Revocation

Preserving Forward Security Authentication with User Revocation

... both time and cost consuming. In an ID- based cryptosystem, the public key of each user is easily computable from a string corresponding to this user’s publicly known identity (e.g., an email address, a residential ...

6

An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks

An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks

... Service Path = <N 2 /S 2 /service>:<3> Step 1 = SLS 1 returns P a 2 to U 1 upon request from U 1 Step 2 = U 1 sends P a 2 and authentication information to AS 1 Step 3 = AS 1 generates and sends K 1 u ...

11

Network service sharing infrastructure: service authentication and authorization revocation

Network service sharing infrastructure: service authentication and authorization revocation

... Service Path = <N 2 /S 2 /service>:<3> Step 1 = SLS 1 returns P a 2 to U 1 upon request from U 1 Step 2 = U 1 sends P a 2 and authentication information to AS 1 Step 3 = AS 1 generates and sends K u 1 ...

6

Expedite Message Authentication Protocol For Vanets: A Study

Expedite Message Authentication Protocol For Vanets: A Study

... Message Authentication Protocol (EMAP) toovercome the problem of the long delay involved inexamining the revocation status of a certificate using a ...Message Authentication Code [HMAC] in the ...

5

A Unique Scheme for Security Authentication System

A Unique Scheme for Security Authentication System

... the authentication methods end up being the reliable components inside a communication ...mutual authentication, user credentials privacy and SK-security have to be considered ...based authentication ...

6

Cryptanalysis  on  `Robust  Biometrics-Based  Authentication  Scheme  for  Multi-server  Environment'

Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'

... Abstract. Authentication plays an important role in an open network environ- ment in order to authenticate two communication parties among each ...as authentication, user credentials’ privacy, user ...

11

Abstract Vehicular ad hoc networks (VANETs) adopt the Expedite Message Authentication Protocol (EMAP)

Abstract Vehicular ad hoc networks (VANETs) adopt the Expedite Message Authentication Protocol (EMAP)

... The VANETs consist of entities including On-Board Units (OBUs) and infrastructure Road-Side Units (RSUs). Vehicle-to Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications are the two basic communication ...

7

Authentication in stealth distributed hash tables

Authentication in stealth distributed hash tables

... how authentication is performed on the DHT presents an issue of balance between overhead and ...required authentication operations (such as retrieving appropriate certificates or checking revocation ...

12

Multiple Biometric Authentication Based Secure Protocol Using Smartcard Server

Multiple Biometric Authentication Based Secure Protocol Using Smartcard Server

... phase, authentication and key agreement phase, password change phase, and revocation and re-registration ...multiserver authentication protocol using wise card and ECC, which withstands the safety ...

6

Fast and Secure HMAC Function Message Authentication Protocol for Vehicular Ad Hoc Networks

Fast and Secure HMAC Function Message Authentication Protocol for Vehicular Ad Hoc Networks

... Certificate Revocation Lists (CRLs) for their ...the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the ...

6

Secure, Efficient Data Sharing For Dynamic Groups among Multiple Owners in Cloud with Anonymous Authentication

Secure, Efficient Data Sharing For Dynamic Groups among Multiple Owners in Cloud with Anonymous Authentication

... [1] Defines cloud refers to data centre’s hardware and software. They describes obstacles and opportunities in cloud computing. S.Kamara[2] focuses on encrypting sensitive information before it is outsourced to untrusted ...

7

Secure Auditing For Shared Modified Cloud Data with Group User Quieting

Secure Auditing For Shared Modified Cloud Data with Group User Quieting

... user revocation based on vector commitment plus verifier total revocation group ...Message Authentication Code (MAC) generation and symmetric cryptographic ...user revocation in properties ...

11

Anonymous Access Control and User Revocation with Log Managment in Cloud

Anonymous Access Control and User Revocation with Log Managment in Cloud

... anonymous authentication, which provides user revocation and prevents replay ...them. Authentication of users who store and modify the data on the ...and authentication are both collusion ...

6

Review of Authentication in Roaming Service

Review of Authentication in Roaming Service

... verifier-local revocation. In existing VLR design, the cost of revocation check grows rapidly in accordance with the size of revocation ...the authentication and key agreement protocol that ...

6

A Comprehensive Review On Expedite Message Authentication Protocol

A Comprehensive Review On Expedite Message Authentication Protocol

... Message authentication protocol (EMAP) which replaces theCRL checking process by an efficient revocation checking processusing a fast and secure HMAC ...in authentication reduces the end-to-end delay ...

5

Elimination of the Certified Maliciousnode in the MANETs with the Vindication Capability

Elimination of the Certified Maliciousnode in the MANETs with the Vindication Capability

... short revocation time, it achieves high accuracy in releasing legitimate ...certification revocation process is carried ...certification revocation process is carried ...

8

NOVEL APPROACH FOR DATA INTEGRITY MAINTENANCE WITH USER REVOCATION SYSTEM IN CLOUD

NOVEL APPROACH FOR DATA INTEGRITY MAINTENANCE WITH USER REVOCATION SYSTEM IN CLOUD

... User Revocation and file regeneration User revocation is performed by the proxy via a public available RL based on which group members can encrypt their data files and ensure the confidentiality against the ...

5

Providing High Security Assurance To Anti Collusion Information Distribution Scheme for Self-Motivated Clusters in the Cloud

Providing High Security Assurance To Anti Collusion Information Distribution Scheme for Self-Motivated Clusters in the Cloud

... In this document, we have designed a secure data exchange scheme for collusion for dynamic groups in the cloud. In our schema, users can safely secure their private keys from the Certified Authority Administrator group ...

11

Show all 10000 documents...

Related subjects