Results 1 to 10 of about 72,853 (190)

A TWOOA construction for multi-receiver multi-message authentication codes [PDF]

open access: hybridJournal of Mathematical Cryptology, 2008
A (k, n; w) multi-receiver multi-message authentication code allows a transmitter to broadcast up to w − 1 distinct authenticated messages to n receivers in such a way that (1) not only an opponent but also any up to k − 1 receivers cannot cheat any ...
Fuji-Hara Ryoh   +3 more
doaj   +2 more sources

Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks

open access: goldInternational Journal of Distributed Sensor Networks, 2015
Network coding has shown a considerable improvement in terms of capacity and robustness compared to traditional store-and-forward transmission paradigm.
Alireza Esfahani   +4 more
doaj   +2 more sources

Information security with message authentication code

open access: greenRUDN Journal of Engineering Research, 2012
This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on.
T A Bilyk, A A Vnukov
doaj   +1 more source

Binary phase hopping based spreading code authentication technique

open access: yesSatellite Navigation, 2021
Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofing and jamming attacks due to their signal structures. The Spreading Code Authentication (SCA) technique is one of the GNSS message encryption identity authentication ...
Shenran Wang   +3 more
doaj   +1 more source

Graph design for data authentication over insecure communication channel

open access: yesAlexandria Engineering Journal, 2023
Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent.
H. Shabana, R. El-Shanawany, S.R. Halawa
doaj   +1 more source

Randomly Flipped Chip based signal power authentication for GNSS civilian signals

open access: yesIET Radar, Sonar & Navigation, 2023
The navigation signal authentication schemes protect GNSS services from spoofing attacks by attaching unforgeable information to signals. In this study, Randomly Flipped Chip based Signal Power Authentication (RFC‐SPA), is proposed to jointly ...
Yuan Muzi   +4 more
doaj   +1 more source

Tag Generation Using Chaotic Sequences for Physical-Layer Authentication

open access: yesIEEE Access, 2023
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista   +3 more
doaj   +1 more source

Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario

open access: yes网络与信息安全学报, 2020
With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and
Hao WANG   +3 more
doaj   +3 more sources

Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication

open access: yesEntropy, 2022
Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node.
Shaoyu Wang   +5 more
doaj   +1 more source

Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing

open access: yesIEEE Access, 2020
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements.
Shoichi Hirose, Junji Shikata
doaj   +1 more source

Home - About - Disclaimer - Privacy