Results 31 to 40 of about 95,826 (286)
Research on distributed authentication of power IoT based on Hyperledger blockchain
With the development of energy Internet and the implementation of "cloud, big, material and mobile" strategy, the traditional centralized access authentication mode of power Internet of Things terminal is difficult to meet the ubiquitous application ...
Chen Xiaolian +5 more
doaj +1 more source
Estimates for practical quantum cryptography [PDF]
In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal
B. Huttner +21 more
core +2 more sources
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
ForkAE is a NIST lightweight cryptography candidate that uses the forkcipher primitive in two modes of operation – SAEF and PAEF – optimized for authenticated encryption of the shortest messages. SAEF is a sequential and online AEAD that minimizes the memory footprint compared to its alternative parallel mode PAEF, catering to the most constrained ...
Elena Andreeva 0001 +2 more
openaire +2 more sources
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her ...
Amir Masoud Rahmani +7 more
doaj +1 more source
Proxy servers are being increasingly deployed at organizations for performance benefits; however, there still exists drawbacks in ease of client authentication in interception proxy mode mainly for Open Source Proxy Servers.
Agarwal, Tejaswi, Leonetti, Mike A.
core +1 more source
SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core +1 more source
Chaining & counter-based block cipher mode for authentication
For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for ...
HUANG Yu-hua1 +2 more
doaj +2 more sources
Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks [PDF]
In this paper we propose Time Synchronized One-Time-Password scheme to provide secure wake up authentication. The main constraint of wireless sensor networks is their limited power resource that prevents us from using radio transmission over the network ...
Aljareh, Salem, Kavoukis, Anastasios
core +2 more sources
Continuous-variable quantum authentication of physical unclonable keys
We propose a scheme for authentication of physical keys that are materialized by optical multiple-scattering media. The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of ...
Diamanti, Eleni +1 more
core +2 more sources
Pay as You Go: A Generic Crypto Tolling Architecture
The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications.
Bartolomeu, Paulo +2 more
core +1 more source

