• No results found

authentication protocol

HMAC-Based Authentication Protocol: Attacks and Improvements

HMAC-Based Authentication Protocol: Attacks and Improvements

... mutual authentication protocol studied by Jung et ...this protocol is secure against various attacks, we proved that their protocol is not secure against most of the well-known attacks and ...

9

BI-LEVEL AUTHENTICATION FOR EFFECTIVE DATA SHARING IN CLOUD VIA PRIVACY-PRESERVING AUTHENTICATION PROTOCOL

BI-LEVEL AUTHENTICATION FOR EFFECTIVE DATA SHARING IN CLOUD VIA PRIVACY-PRESERVING AUTHENTICATION PROTOCOL

... the authentication to realize that a legal user can access its authorized data only, which ignores the case that the different users may want to share and access each other’s authorized data fields to achieve ...

8

RFID authentication protocol design via BAN logic

RFID authentication protocol design via BAN logic

... mutual authentication protocol of low cost using the simple XOR computation and hash function ...the protocol, we adopt BAN Logic to analysis the security of the ...proposed authentication ...

10

Expedite Message Authentication Protocol For Vanets: A Study

Expedite Message Authentication Protocol For Vanets: A Study

... Abstract:Vehicular ad hoc networks (VANETs) undertake the general public Key Infrastructure (PKI) and certificate Revocation Lists(CRLs) for their protection. In thischallenge Expedite Message Authentication ...

5

A Threat Analysis of The Extensible Authentication Protocol

A Threat Analysis of The Extensible Authentication Protocol

... Extensible Authentication Protocol (EAP) is an authentication framework that is widely used in ...transfer authentication information between a client and a ...request/response protocol ...

28

A Comprehensive Review On Expedite Message Authentication Protocol

A Comprehensive Review On Expedite Message Authentication Protocol

... Message authentication protocol (EMAP) which replaces theCRL checking process by an efficient revocation checking processusing a fast and secure HMAC ...in authentication reduces the end-to-end delay ...

5

Provably Lightweight Rfid Mutual Authentication Protocol

Provably Lightweight Rfid Mutual Authentication Protocol

... Mutual Authentication Protocol (UMAP) circle of ...Mutual Authentication Protocol (LMAP) [3], Minimalist Mutual- Authentication Protocol (M2AP) [4], and the Efficient t Mutual ...

7

On the Security of Anonymous Authentication Protocol for Mobile Pay TV

On the Security of Anonymous Authentication Protocol for Mobile Pay TV

... anonymous authentication protocol for mobile pay-TV is ...anonymous authentication to users by preventing in- truders from obtaining users IDs during the mutual au- thentication between mobile ...

9

MULTI-ACCESS OF PREVILEGED DATA IN CLOUD BY AUTHENTICATION PROTOCOL

MULTI-ACCESS OF PREVILEGED DATA IN CLOUD BY AUTHENTICATION PROTOCOL

... data authentication protocol (MAPDAP) to address above privacy issue for cloud ...(e.g., authentication, data anonymity, user privacy, and forward security); 2) attribute based access control is ...

8

Safe Authentication Protocol for Secure USB Memories

Safe Authentication Protocol for Secure USB Memories

... successful authentication can be replayed by an ...the authentication protocol is securely designed, everything is highly encrypted and messages and resources are all confidential, it is impossible ...

10

STRONG AUTHENTICATION POLICY FOR CLOUD COMPUTING ENVIRONMENT USING MODIFIED KERBEROS AUTHENTICATION PROTOCOL

STRONG AUTHENTICATION POLICY FOR CLOUD COMPUTING ENVIRONMENT USING MODIFIED KERBEROS AUTHENTICATION PROTOCOL

... This approach of security using Kerberos authentication protocol is the better way and with the Kerberos protocol, RSA and ECC is also used, which will make it more secure. RSA and ECC hereused for ...

8

FPGA Implementation OF RFID Mutual Authentication Protocol

FPGA Implementation OF RFID Mutual Authentication Protocol

... An authentication scheme was originally included as part of the EPC C1G2 industrial standard to secure RFID ...the authentication protocol with the area optimisation is very ...

5

M-Pass: Web Authentication Protocol

M-Pass: Web Authentication Protocol

... A user authentication protocol i.e. m-Pass leverages cell phones and SMS to prevent password stealing and password reuse attacks. The assumption it makes is that each website possesses a unique phone ...

5

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer

... Extensible Authentication Protocol –Transport Layer Security is completely password cracking resistant because it does not rely on user ...Extensible Authentication Protocol –Transport Layer ...

5

An  Optimal  Strong  Password  Authentication  Protocol  with  USB  Sticks

An Optimal Strong Password Authentication Protocol with USB Sticks

... For authentication purpose, an improved authentication protocol which is used by the remote user using USB sticks was ...The authentication protocol maintains the connectivity ...

5

High Secure Crypto Biometric Authentication Protocol

High Secure Crypto Biometric Authentication Protocol

... biometric authentication systems are primarily centered around template security, revocability, and ...the authentication process can alleviate some of these concerns as shown by biometric ...biometric ...

7

Weaknesses  in  a  Recently  Proposed  RFID  Authentication  Protocol

Weaknesses in a Recently Proposed RFID Authentication Protocol

... Recently, an RFID authentication protocol has been proposed by Cheng et al. [2]. It is claimed that the proposed protocol provides almost all security properties in the literature. Nevertheless we ...

8

A CLUSTER BASED EXPENDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETS

A CLUSTER BASED EXPENDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETS

... Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking ...Message Authentication Code shared only between non ...

7

A New Authentication Protocol for UMTS Mobile Networks

A New Authentication Protocol for UMTS Mobile Networks

... UMTS authentication and key agreement protocol and the signalling traffic that are generated by registration, call termination, and call origination have been investigated and analyzed as well as the ...

10

A Secured Mutual Authentication Protocol For RFID System

A Secured Mutual Authentication Protocol For RFID System

... mutual authentication mechanism during data ...proposed protocol ―[8]‖. Timestamp based RFID mutual authentication protocol shown in ...this protocol is location tracking ...

5

Show all 10000 documents...

Related subjects