• No results found

mutual authentication protocol

A Secured Mutual Authentication Protocol For RFID System

A Secured Mutual Authentication Protocol For RFID System

... Many authentication mechanisms are used and proposed to secure and authenticate each other during data transmission between tag and ...based mutual authentication protocol for RFID system and ...

5

Provably Lightweight Rfid Mutual Authentication Protocol

Provably Lightweight Rfid Mutual Authentication Protocol

... Ultralightweight Mutual Authentication Protocol (UMAP) circle of ...Lightweight Mutual Authentication Protocol (LMAP) [3], Minimalist Mutual- Authentication ...

7

Fully  Deniable  Mutual  Authentication  Protocol  Based  on  RSA  Signature

Fully Deniable Mutual Authentication Protocol Based on RSA Signature

... Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took ...

6

FPGA Implementation of Mutual Authentication Protocol Using Modular Arithmetic

FPGA Implementation of Mutual Authentication Protocol Using Modular Arithmetic

... RFID mutual authentication protocol is described using structural Verilog HDL to produce gate level net list and synthesized using Xilinx ISE design suite ...tag-reader authentication ...

7

A Mutual Authentication Protocol Which Uses Id for Security from Privileged – Insider Attacks

A Mutual Authentication Protocol Which Uses Id for Security from Privileged – Insider Attacks

... secure protocol for communication. So, this study introduces an id based mutual authentication protocol also known as Elliptic Curve Cryptography protocol for security ...RSA ...

5

Attacking A PUF Based Mutual Authentication Protocol Designed For Internet of Things

Attacking A PUF Based Mutual Authentication Protocol Designed For Internet of Things

... strong authentication protocols are needed for the machine to machine (m2m) ...the authentication protocols can show weaknesses, if not ...a mutual authentication protocol proposed for ...

5

FPGA Implementation OF RFID Mutual Authentication Protocol

FPGA Implementation OF RFID Mutual Authentication Protocol

... Abstract: Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. The wide deployment of RFID also incurs many security concerns and ...

5

Wide-weak  Privacy  Preserving  RFID  Mutual  Authentication  Protocol

Wide-weak Privacy Preserving RFID Mutual Authentication Protocol

... RFID authentication protocols, the workload on the tag side should be as minimum as ...identification protocol, in particular, prover as tag and verifier as ...RFID authentication protocol, ...

14

Implementing and Verifying a Secure M2m Mutual Authentication Protocol Based on Hash Functions

Implementing and Verifying a Secure M2m Mutual Authentication Protocol Based on Hash Functions

... The rapid advancement of network technology has increased the access to superfast communication networks, engendering a range of services and businesses and enabling large amounts of information processing [3,4]. ...

5

An RFID Mutual Authentication Protocol using ECIES

An RFID Mutual Authentication Protocol using ECIES

... Reader to Tag Authentication: Upon obtaining EKp(s*⊕ID), the will pass it to the backend database to decrypt it. The decrypted value DKs( s*⊕ID)(by using its private key Ks)is used to extract the tag’s ID by ...

5

High Secure Mutual Authentication Protocol For Tvws Database

High Secure Mutual Authentication Protocol For Tvws Database

... called Protocol to Access White Space database (PAWS) is aims to define the device-database interface for TVWS database ...This protocol did not state any type of authentication procedure but just ...

6

HMAC-Based Authentication Protocol: Attacks and Improvements

HMAC-Based Authentication Protocol: Attacks and Improvements

... Message Authentication Code (HMAC)-based RFID mutual authentication protocol which is introduced by Jung et ...This protocol is based on HMAC, and it is assumed that the communications ...

9

An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card

An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card

... some authentication protocols using smart card have been proposed ...the protocol using public key en- cryption is much more secure, it may incur a burdensome computation ...tion protocol using ...

8

Result Evaluation for Anti-Phishing Design Using Mutual Authentication Technique

Result Evaluation for Anti-Phishing Design Using Mutual Authentication Technique

... We perform an analysis of the phishing and the line of attack in which it affect the client & association. Anti- Phishing Toolbars are most common and easily available on the web; our study shows that they are good ...

6

Extensible Authentication Protocol Vulnerabilities and Improvements

Extensible Authentication Protocol Vulnerabilities and Improvements

... The interval varies for different wireless networks and different types of wireless clients. It also depends on the stage of the authentication process. The second attack point as shown in Figure 6 requires the ...

58

Anonymous and Authentication Protocol For Multi-Server

Anonymous and Authentication Protocol For Multi-Server

... This section proposes an anonymous authentica- tion scheme for a multi-server environment. We assume that there are three entities in this scheme: registration center (RC), user (U), and server (S) in this scheme. The ...

11

CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

... cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric ...biometric authentication is used as the key for encryption and ...

5

M-Pass: Web Authentication Protocol

M-Pass: Web Authentication Protocol

... and authentication of user a text based password is primarily ...user authentication can resist brute force and dictionary attacks if users select strong passwords to provide sufficient ...user ...

5

A Threat Analysis of The Extensible Authentication Protocol

A Threat Analysis of The Extensible Authentication Protocol

... clear text and does not use a SALT in its hashes so that dictionary and brute force attacks can be mounted. Although, theoretically LEAP is secure if complex enough passwords are used [15]. By complex enough, we mean it ...

28

A Secure and Efficient Mutual Authentication with Key Agreement Schema in Wireless Network

A Secure and Efficient Mutual Authentication with Key Agreement Schema in Wireless Network

...  PID controller  Mass conversation between the bodies  Fuzzy logic controller of the system  Neural network controller of the system  Thickness  Roll and plate loop The mathematica[r] ...

11

Show all 10000 documents...

Related subjects