Results 201 to 210 of about 3,852 (258)

ChebIoD: a Chebyshev polynomial-based lightweight authentication scheme for internet of drones environments. [PDF]

open access: yesSci Rep
Al-Mekhlafi ZG   +9 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Qubits based mutual authentication protocol

SECURITY AND PRIVACY, 2022
AbstractAuthentication of the entity is the initial step toward secure transaction over the internet. The evolution in the nature and types of attacks have forced the commerce industry to move from single factor to multi‐factor authentication technique largely employing biometric codes for human based entity.
Prashant Nema, Manisha J. Nene
openaire   +1 more source

Mutual Chip Authentication

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013
We present a Anonymous Mutual Authentication (AMA) protocol for authentication and key agreement between cryptographic devices. It is an alternative for Terminal Authentication (TA) plus Chip Authentication (ChA) developed for electronic travel documents.
Lucjan Hanzlik   +3 more
openaire   +1 more source

Lightweight mutual RFID authentication

2012 IEEE International Conference on Communications (ICC), 2012
A lightweight mutual authentication protocol is proposed for RFID systems in which both the tags and the reader can be authenticated to each other. The proposed protocol is based on the McEliece cryptosystem without requiring Radio Frequency Identification (RFID) tags to store the large matrices needed in the McEliece cryptosystem.
Behzad Malek, Ali Miri
openaire   +1 more source

Authentication and Mutual Authentication

2014
In a sensitive environment, it is common to implement user authentication, possibly based on several factors, in order to ensure only authorized users have access to restricted features or information. But today more and more devices are interacting directly to perform some actions, or deliver a high level service to their user, like in smart grid and ...
Asad Ali, François Tuot, Gerald Maunier
openaire   +1 more source

Mutual authentication in RFID

Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption is allowed, we prove that secure protocols cannot protect privacy unless we assume tags have a ...
Radu-Ioan Paise, Serge Vaudenay
openaire   +1 more source

Agent-host mutual authentication

Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No.99CH36300), 2003
As an alternative to the present client/server applications on the Internet, researchers in universities and industry are trying to define a secure agent infrastructure which can protect both the agent and the agent place (server, ducking place). The main advantage of the agent is that it can move (roam) on the Internet searching for answers for the ...
O.M. Ba-Rukab, M.M. Shahsavari
openaire   +1 more source

Efficient Ultralightweight RFID Mutual Authentication

2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), 2014
In the RFID (Radio Frequency Identification) system, the communication between the reader and tags is vulnerable to attacks due to the nature of RF signals. Typical attacks include the forged-server, forged-tag, man-in-the-middle (MitM), tracking, replay, forward secrecy and denial of service (DoS) attacks.
Yu-Chung Huang, Jehn-Ruey Jiang
openaire   +1 more source

A nested mutual authentication protocol

ACM SIGOPS Operating Systems Review, 1999
This paper describes an authentication protocol that is suited to modern, object-based, client-server systems. Each object in a chain, whether acting in a client or server role, handles authentication with its neighbours, without any need to be aware of the resultant global behaviour. Session keys are returned by an authentication server which services
John A. Bull, David J. Otway
openaire   +1 more source

Home - About - Disclaimer - Privacy