Results 211 to 220 of about 3,852 (258)
Some of the next articles are maybe not open access.

SMAP: Simple Mutual Authentication Protocol

2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, 2007
RFID systems aim at identifying objects in a wide variety of environments without any contact between tags that hold identities and readers. In order to secure RFID systems as much as possible, most solutions do not only require tags to authenticate themselves to readers, but they also require readers to authenticate themselves to tags to avoid ...
Eric Renault, Selma Boumerdassi
openaire   +1 more source

Protocol of Secure Mutual Authentication

2007 IEEE SMC Information Assurance and Security Workshop, 2007
The paper discusses the peculiarities of modern information systems, problems with traditional authentication protocols and introduces a new authentication protocol that allows transparent secure authentication in dynamic distributed information systems.
Natalia Miloslavskaya   +2 more
openaire   +1 more source

Nested mechanism for mutual authentication

2011 3rd International Conference on Electronics Computer Technology, 2011
This paper proposes a mutual authentication technique for use in the wireless mobile network. Authentication of mobile subscribers is a challenging issue due to increasing security threats as it acts as the first defence against attackers. We come up with a novel authentication mechanism, called Group Registration, which reduces the huge bandwidth ...
S Sridhar, K Vimala Devi
openaire   +1 more source

Efficient and timely mutual authentication

ACM SIGOPS Operating Systems Review, 1987
This paper describes a protocol for efficient mutual authentication (via a mutually trusted third party) that assures both principal parties of the timeliness of the interaction without the use of clocks or double encipherment. The protocol requires a total of only four messages to be exchanged between the three parties concerned.
Dave Otway, Owen Rees
openaire   +1 more source

Security of lightweight mutual authentication protocols

The Journal of Supercomputing, 2020
Sensors and IoT (Internet of Things), which include RFID (Radio-Frequency IDentification) tags, have witnessed widespread adoption across a wide variety of application domains over the last two decades. These sensors and IoT devices are often a part of distributed sensor networks.
Yu-Ju Tu   +2 more
openaire   +2 more sources

Derandomized PACE with Mutual Authentication

2019
We present a derandomized version of the ICAO protocol PACE – a PAKE protocol (password authenticated key exchange) used for identity documents including biometric passports and future European personal ID documents. The modification aims to remove necessity of implementing random number generator and thereby reduce the cost of the chip and its ...
Adam Bobowski, Mirosław Kutyłowski
openaire   +1 more source

Mutual Authentication Protocol for RFID System

2011 14th IEEE International Conference on Computational Science and Engineering, 2011
Radio-Frequency Identification (RFID) is a leading automatic identification technology. The main technology components of an RFID system are a tag, reader, and database. The use of tags and databases raises significant impact on security considerations associated to the confidentiality, integrity, and accessibility of the data on the tags, in the ...
Yu-Jung Huang   +4 more
openaire   +1 more source

A Mutual Authentication Protocol for RFID

IT Professional, 2011
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
null Chia-Hui Wei   +2 more
openaire   +1 more source

Mutual Biometric Authentication

2007
This article addresses another severe threat affecting the security of cellular systems, called pilot aliasing attack. This problem occurred due to pilot code reuse among different cellular carriers.
openaire   +1 more source

Improvement upon Mutual Password Authentication Scheme

2008 International Seminar on Business and Information Management, 2008
Many password authentication schemes have been proposed for electronic commerce environment; however, none of them is secure enough. Hwang and Yeh proposed an improvement on the Peyravian-Zunic password authentication scheme including protected password transmission and password change.
null Lu Zhu   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy