Results 211 to 220 of about 3,852 (258)
Some of the next articles are maybe not open access.
SMAP: Simple Mutual Authentication Protocol
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, 2007RFID systems aim at identifying objects in a wide variety of environments without any contact between tags that hold identities and readers. In order to secure RFID systems as much as possible, most solutions do not only require tags to authenticate themselves to readers, but they also require readers to authenticate themselves to tags to avoid ...
Eric Renault, Selma Boumerdassi
openaire +1 more source
Protocol of Secure Mutual Authentication
2007 IEEE SMC Information Assurance and Security Workshop, 2007The paper discusses the peculiarities of modern information systems, problems with traditional authentication protocols and introduces a new authentication protocol that allows transparent secure authentication in dynamic distributed information systems.
Natalia Miloslavskaya +2 more
openaire +1 more source
Nested mechanism for mutual authentication
2011 3rd International Conference on Electronics Computer Technology, 2011This paper proposes a mutual authentication technique for use in the wireless mobile network. Authentication of mobile subscribers is a challenging issue due to increasing security threats as it acts as the first defence against attackers. We come up with a novel authentication mechanism, called Group Registration, which reduces the huge bandwidth ...
S Sridhar, K Vimala Devi
openaire +1 more source
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review, 1987This paper describes a protocol for efficient mutual authentication (via a mutually trusted third party) that assures both principal parties of the timeliness of the interaction without the use of clocks or double encipherment. The protocol requires a total of only four messages to be exchanged between the three parties concerned.
Dave Otway, Owen Rees
openaire +1 more source
Security of lightweight mutual authentication protocols
The Journal of Supercomputing, 2020Sensors and IoT (Internet of Things), which include RFID (Radio-Frequency IDentification) tags, have witnessed widespread adoption across a wide variety of application domains over the last two decades. These sensors and IoT devices are often a part of distributed sensor networks.
Yu-Ju Tu +2 more
openaire +2 more sources
Derandomized PACE with Mutual Authentication
2019We present a derandomized version of the ICAO protocol PACE – a PAKE protocol (password authenticated key exchange) used for identity documents including biometric passports and future European personal ID documents. The modification aims to remove necessity of implementing random number generator and thereby reduce the cost of the chip and its ...
Adam Bobowski, Mirosław Kutyłowski
openaire +1 more source
Mutual Authentication Protocol for RFID System
2011 14th IEEE International Conference on Computational Science and Engineering, 2011Radio-Frequency Identification (RFID) is a leading automatic identification technology. The main technology components of an RFID system are a tag, reader, and database. The use of tags and databases raises significant impact on security considerations associated to the confidentiality, integrity, and accessibility of the data on the tags, in the ...
Yu-Jung Huang +4 more
openaire +1 more source
A Mutual Authentication Protocol for RFID
IT Professional, 2011Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
null Chia-Hui Wei +2 more
openaire +1 more source
Mutual Biometric Authentication
2007This article addresses another severe threat affecting the security of cellular systems, called pilot aliasing attack. This problem occurred due to pilot code reuse among different cellular carriers.
openaire +1 more source
Improvement upon Mutual Password Authentication Scheme
2008 International Seminar on Business and Information Management, 2008Many password authentication schemes have been proposed for electronic commerce environment; however, none of them is secure enough. Hwang and Yeh proposed an improvement on the Peyravian-Zunic password authentication scheme including protected password transmission and password change.
null Lu Zhu +2 more
openaire +1 more source

