Results 31 to 40 of about 75,500 (332)

A New Construction of Multisender Authentication Codes from Polynomials over Finite Fields

open access: yesJournal of Applied Mathematics, 2013
Multisender authentication codes allow a group of senders to construct an authenticated message for a receiver such that the receiver can verify the authenticity of the received message.
Xiuli Wang
doaj   +1 more source

A New Construction of Multisender Authentication Codes from Pseudosymplectic Geometry over Finite Fields

open access: yesJournal of Applied Mathematics, 2013
Multisender authentication codes allow a group of senders to construct an authenticated message for one receiver such that the receiver can verify authenticity of the received message.
Xiuli Wang
doaj   +1 more source

Formal Verification of Security Protocol Implementations: A Survey [PDF]

open access: yes, 2014
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer   +27 more
core   +3 more sources

Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]

open access: yes, 2006
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal   +5 more
core   +1 more source

A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]

open access: yes, 2020
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal   +2 more
core   +2 more sources

Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2018
The Message Authenticator Algorithm (MAA) is one of the first cryptographic functions for computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity ...
Hubert Garavel, Lina Marsso
doaj   +1 more source

MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications

open access: yesSensors, 2023
The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol that
Özlem Şeker   +2 more
doaj   +1 more source

Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2021
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj   +1 more source

Qubit authentication [PDF]

open access: yes, 2001
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our
Curty, Marcos   +3 more
core   +2 more sources

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Home - About - Disclaimer - Privacy