Results 31 to 40 of about 72,952 (289)

Message Authentication Code over a Wiretap Channel

open access: yes, 2015
Message Authentication Code (MAC) is a keyed function $f_K$ such that when Alice, who shares the secret $K$ with Bob, sends $f_K(M)$ to the latter, Bob will be assured of the integrity and authenticity of $M$.
Chen, Dajiang   +2 more
core   +1 more source

A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]

open access: yes, 2020
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal   +2 more
core   +2 more sources

Novel Hardware Implementation of the Cipher Message Authentication Code

open access: yesJournal of Computer Systems, Networks, and Communications, 2008
A new algorithm for producing message authenticating codes (MACs) was recently proposed by NIST. The MAC protects both a message's integrity—by ensuring that a different MAC will be produced if the message has changed—as well as its authenticity because ...
H. E. Michail   +4 more
doaj   +1 more source

Providing Authentication & Authorization Mechanisms for Active Service Charging [PDF]

open access: yes, 2002
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among others features.
Alarcos, Bernardo   +3 more
core   +3 more sources

Design and Analysis of Lightweight Authentication Protocol for Securing IoD

open access: yesIEEE Access, 2021
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services. The main entities in IoD
Saeed Ullah Jan   +2 more
doaj   +1 more source

Efficient Codes for Limited View Adversarial Channels

open access: yes, 2013
We introduce randomized Limited View (LV) adversary codes that provide protection against an adversary that uses their partial view of the communication to construct an adversarial error vector to be added to the channel.
Safavi-Naini, Reihaneh, Wang, Pengwei
core   +1 more source

How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]

open access: yes, 2005
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core   +2 more sources

PudgyTurtle Mode Resists Bit-Flipping Attacks

open access: yesCryptography, 2023
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj   +1 more source

Combinatorial Bounds and Characterizations of Splitting Authentication Codes

open access: yes, 2010
We present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, we prove a combinatorial lower bound on the number of encoding rules and a combinatorial ...
B Du   +26 more
core   +1 more source

Quantum authentication with unitary coding sets [PDF]

open access: yes, 2002
A general class of authentication schemes for arbitrary quantum messages is proposed. The class is based on the use of sets of unitary quantum operations in both transmission and reception, and on appending a quantum tag to the quantum message used in ...
David J. Santos   +8 more
core   +2 more sources

Home - About - Disclaimer - Privacy