Results 21 to 30 of about 75,500 (332)

Quantum message authentication codes [PDF]

open access: green, 2001
This paper has been withdrawn because of an error in the proof of Lemma 1. Without Lemma 1, the result of the main theorem (with the same proof, but omitting the use of Lemma 1 to extend things to general attacks) only holds for attacks in which the attacker applies a tensor product of Pauli matrices (for qubits) or generalized Pauli matrices.
Howard Barnum
openaire   +3 more sources

Binary phase hopping based spreading code authentication technique

open access: yesSatellite Navigation, 2021
Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofing and jamming attacks due to their signal structures. The Spreading Code Authentication (SCA) technique is one of the GNSS message encryption identity authentication ...
Shenran Wang   +3 more
doaj   +1 more source

Graph design for data authentication over insecure communication channel

open access: yesAlexandria Engineering Journal, 2023
Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent.
H. Shabana, R. El-Shanawany, S.R. Halawa
doaj   +1 more source

Randomly Flipped Chip based signal power authentication for GNSS civilian signals

open access: yesIET Radar, Sonar & Navigation, 2023
The navigation signal authentication schemes protect GNSS services from spoofing attacks by attaching unforgeable information to signals. In this study, Randomly Flipped Chip based Signal Power Authentication (RFC‐SPA), is proposed to jointly ...
Yuan Muzi   +4 more
doaj   +1 more source

Tag Generation Using Chaotic Sequences for Physical-Layer Authentication

open access: yesIEEE Access, 2023
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista   +3 more
doaj   +1 more source

Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario

open access: yes网络与信息安全学报, 2020
With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and
Hao WANG   +3 more
doaj   +3 more sources

Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

open access: yesIEEE Access, 2019
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain   +2 more
doaj   +1 more source

Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication

open access: yesEntropy, 2022
Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node.
Shaoyu Wang   +5 more
doaj   +1 more source

Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Tweakable block ciphers (TBCs) have proven highly useful to boost the security guarantees of authentication schemes. In 2017, Cogliati et al. proposed two MACs combining TBC and universal hash functions: a nonce-based MAC called NaT and a deterministic ...
Wonseok Choi   +6 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy