• No results found

[PDF] Top 20 AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS

Has 10000 "AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS" found on our website. Below are the top 20 most common "AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS".

AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS

AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS

... optimized certificate-based protocol for mobile network with authentication and security has been pro- posed by Yi et ...This protocol allows efficient computation and ... See full document

6

ENHANCING SECURITY IN MOBILE AD HOC NETWORKS USING CLUSTER BASED CERTIFICATE REVOCATION

ENHANCING SECURITY IN MOBILE AD HOC NETWORKS USING CLUSTER BASED CERTIFICATE REVOCATION

... used authentication method in the MANETs, which is used to secure network ...applications. Certificate is used to prove the identity of a ...the certificate issuer and digital signature of the ... See full document

7

Authentication in a layered security approach for mobile ad hoc networks

Authentication in a layered security approach for mobile ad hoc networks

... [23] protocol a proactive and a reactive approach are applied ...is based on a public key ...This protocol takes advantage of both onion and on demand ...anonymous protocol for mobile ... See full document

13

Classification and Review of Security Schemes in Mobile Computing

Classification and Review of Security Schemes in Mobile Computing

... and mobile node at the site has to know the network authentication ...and Mobile-IP registration messages is feasible, even though transmitting such a signature requires more link ...that ... See full document

22

Cluster based certificate revocation For mobile ad hoc networks

Cluster based certificate revocation For mobile ad hoc networks

... 3.3 Reliability-Based Node Classification According to the behavior of nodes in the network, three types of nodes are classified according to their behaviors: valid, malicious, and attacker nodes. A valid node is ... See full document

6

A New Authentication Protocol for UMTS Mobile Networks

A New Authentication Protocol for UMTS Mobile Networks

... provide security services in wireless networks, au- thentication is used as an initial process to authorize a mobile terminal for communication through secret credentials ...In authentication ... See full document

10

SRAAA : A SECURE ON-DEMAND ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

SRAAA : A SECURE ON-DEMAND ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

... routing protocol which is based on the key management, a secure path and protecting data to satisfy our security ...the security requirements and the types of attacks in mobile ad hoc ... See full document

9

Enhancement of user Identity Security in Authentication and Key Agreement Protocol for Wireless Communication Network

Enhancement of user Identity Security in Authentication and Key Agreement Protocol for Wireless Communication Network

... generation mobile technological design for wireless ...IP based connectivity, fully interworking with heterogeneous wireless networks and seamless integration with other existing wireless ... See full document

7

A Trusted Data Transmission Protocol for Mobile Ad Hoc Networks

A Trusted Data Transmission Protocol for Mobile Ad Hoc Networks

... various mobile data transmission schemes to exchange meaningful information from one node to another ...recent mobile data transmission ...of mobile users, and in this mechanism, they have used the ... See full document

5

Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs

Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs

... wireless networks brings about many security problems in Portable Communication Systems (PCS), which can provide mobile users with an opportunity to enjoy global roaming ...user authentication ... See full document

5

The Performance of Different Routing Protocols Available in Underwater Wireless Sensor Network-A Survey

The Performance of Different Routing Protocols Available in Underwater Wireless Sensor Network-A Survey

... Sensor Networks, many promising Routing Protocols are available to achieve many applications such as Marine information collection, underwater climate observation, pollution management, navigation and disaster ... See full document

5

Security Issues in Web Services

Security Issues in Web Services

... model based on trust on small-world networks based on trust relationship of service entities, and this model with service ...measurement based on its perceived trust and reliability in given ... See full document

6

Security Model for Scady Grid Toolkit – Analysis and Implementation

Security Model for Scady Grid Toolkit – Analysis and Implementation

... Alchemi [8, 9, 10] also works on X.509 certificate authentication. First, a trusted certified communication is set up between two nodes. Then the client node (Executor) is authenticated by the server node ... See full document

7

Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups

Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups

... for security in multi-domain network ...the security while share the resource among multiple ...key authentication center, which provide good ...pattern based on ... See full document

7

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications

... our protocol costs little more, that is because our protocol possesses many unique features, such as not maintaining any password or verification table on the SIP server, users being able to choose or ... See full document

26

Verifiable Secret Sharing Authentication Scheme without Trusted Center for Mobile Ad Hoc Network

Verifiable Secret Sharing Authentication Scheme without Trusted Center for Mobile Ad Hoc Network

... (13) If the above equation is true, the signature synthesized by network nodes is valid. The Authenticity of nodes especially the new nodes for MANET is verified. On the other hand, the process of signature synthesis is ... See full document

5

A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques

A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques

... Halim et al. employ Agent-based trusted solution for securing the DSR protocol [14]. In the proposed model the authors use a multi-agent system (MAS) consisting of two types which collaborate with each ... See full document

14

On  the  Security  of  `An  Efficient  Biometric  Authentication  Protocol  for  Wireless  Sensor  Networks'

On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'

... also in the GW-node as pointed out in Das et al.’s scheme [9]. This strategy will certainly help to improve significantly the resilience against node capture attack, because compromise of a sensor node only reveals its ... See full document

9

Abstract Internet Key Exchange (IKE) protocol is the most

Abstract Internet Key Exchange (IKE) protocol is the most

... negotiation protocol usable for IKE implementation based on PKIX in elliptic curve ...ECC based public keys of any entity in a chaining fashion from leave nodes towards the root of the tree, where ... See full document

6

New Authentication and Key Agreement Protocol for LTE WLAN Interworking

New Authentication and Key Agreement Protocol for LTE WLAN Interworking

... Authentication of the mobile node is done by using Extensible Authentication Protocol–Authentication and Key Agreement EAP-AKA, was developed as a secure authentication mechanism through[r] ... See full document

5

Show all 10000 documents...