Results 1 to 10 of about 72,853 (190)
A TWOOA construction for multi-receiver multi-message authentication codes [PDF]
A (k, n; w) multi-receiver multi-message authentication code allows a transmitter to broadcast up to w − 1 distinct authenticated messages to n receivers in such a way that (1) not only an opponent but also any up to k − 1 receivers cannot cheat any ...
Fuji-Hara Ryoh +3 more
doaj +2 more sources
Network coding has shown a considerable improvement in terms of capacity and robustness compared to traditional store-and-forward transmission paradigm.
Alireza Esfahani +4 more
doaj +2 more sources
Information security with message authentication code
This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on.
T A Bilyk, A A Vnukov
doaj +1 more source
Binary phase hopping based spreading code authentication technique
Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofing and jamming attacks due to their signal structures. The Spreading Code Authentication (SCA) technique is one of the GNSS message encryption identity authentication ...
Shenran Wang +3 more
doaj +1 more source
Graph design for data authentication over insecure communication channel
Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent.
H. Shabana, R. El-Shanawany, S.R. Halawa
doaj +1 more source
Randomly Flipped Chip based signal power authentication for GNSS civilian signals
The navigation signal authentication schemes protect GNSS services from spoofing attacks by attaching unforgeable information to signals. In this study, Randomly Flipped Chip based Signal Power Authentication (RFC‐SPA), is proposed to jointly ...
Yuan Muzi +4 more
doaj +1 more source
Tag Generation Using Chaotic Sequences for Physical-Layer Authentication
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista +3 more
doaj +1 more source
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and
Hao WANG +3 more
doaj +3 more sources
Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node.
Shaoyu Wang +5 more
doaj +1 more source
Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements.
Shoichi Hirose, Junji Shikata
doaj +1 more source

