Results 31 to 40 of about 75,500 (332)
A New Construction of Multisender Authentication Codes from Polynomials over Finite Fields
Multisender authentication codes allow a group of senders to construct an authenticated message for a receiver such that the receiver can verify the authenticity of the received message.
Xiuli Wang
doaj +1 more source
Multisender authentication codes allow a group of senders to construct an authenticated message for one receiver such that the receiver can verify authenticity of the received message.
Xiuli Wang
doaj +1 more source
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer +27 more
core +3 more sources
Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal +5 more
core +1 more source
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal +2 more
core +2 more sources
Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm [PDF]
The Message Authenticator Algorithm (MAA) is one of the first cryptographic functions for computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity ...
Hubert Garavel, Lina Marsso
doaj +1 more source
The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol that
Özlem Şeker +2 more
doaj +1 more source
Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj +1 more source
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our
Curty, Marcos +3 more
core +2 more sources
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj +1 more source

