Results 31 to 40 of about 95,826 (286)

Research on distributed authentication of power IoT based on Hyperledger blockchain

open access: yesDianzi Jishu Yingyong, 2019
With the development of energy Internet and the implementation of "cloud, big, material and mobile" strategy, the traditional centralized access authentication mode of power Internet of Things terminal is difficult to meet the ubiquitous application ...
Chen Xiaolian   +5 more
doaj   +1 more source

Estimates for practical quantum cryptography [PDF]

open access: yes, 1999
In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal
B. Huttner   +21 more
core   +2 more sources

Nonce-Misuse Security of the SAEF Authenticated Encryption Mode

open access: yes, 2021
ForkAE is a NIST lightweight cryptography candidate that uses the forkcipher primitive in two modes of operation – SAEF and PAEF – optimized for authenticated encryption of the shortest messages. SAEF is a sequential and online AEAD that minimizes the memory footprint compared to its alternative parallel mode PAEF, catering to the most constrained ...
Elena Andreeva 0001   +2 more
openaire   +2 more sources

AMAPG: Advanced Mobile Authentication Protocol for GLOMONET

open access: yesIEEE Access, 2021
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her ...
Amir Masoud Rahmani   +7 more
doaj   +1 more source

Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode

open access: yes, 2013
Proxy servers are being increasingly deployed at organizations for performance benefits; however, there still exists drawbacks in ease of client authentication in interception proxy mode mainly for Open Source Proxy Servers.
Agarwal, Tejaswi, Leonetti, Mike A.
core   +1 more source

SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core   +1 more source

Chaining & counter-based block cipher mode for authentication

open access: yesTongxin xuebao, 2009
For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for ...
HUANG Yu-hua1   +2 more
doaj   +2 more sources

Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks [PDF]

open access: yes, 2013
In this paper we propose Time Synchronized One-Time-Password scheme to provide secure wake up authentication. The main constraint of wireless sensor networks is their limited power resource that prevents us from using radio transmission over the network ...
Aljareh, Salem, Kavoukis, Anastasios
core   +2 more sources

Continuous-variable quantum authentication of physical unclonable keys

open access: yes, 2017
We propose a scheme for authentication of physical keys that are materialized by optical multiple-scattering media. The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of ...
Diamanti, Eleni   +1 more
core   +2 more sources

Pay as You Go: A Generic Crypto Tolling Architecture

open access: yes, 2020
The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications.
Bartolomeu, Paulo   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy