Results 221 to 230 of about 3,852 (258)
Some of the next articles are maybe not open access.
Mutual entity authentication for LTE
2011 7th International Wireless Communications and Mobile Computing Conference, 2011In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses.
openaire +1 more source
Mutual Authentication in Wireless Mesh Networks
2008 IEEE International Conference on Communications, 2008A wireless mesh network (WMN) is a new wireless network technology and there is a trend to adopt the technology to build commercial mobile ad hoc networks. Since a WMN is such a network without fixed infrastructure and is operated in an open medium, any user within the range covered by radio wave may access the network.
Y. Fu, J. He, R. Wang, G. Li
openaire +1 more source
Mutual Authentication using Fuzzy Fingerprint Vault
2006 International Conference on Computational Intelligence and Security, 2006Biometric-based authentication can provide strong security gua rantee about the identity of users. However, security/privacy of biometric data is particularly important as compromise of the data will be permanent. On the contrary, the security of a typical PKI-based user authentication solution is deteriorated by a simple password once the private key ...
Daesung Moon +3 more
openaire +1 more source
Mutual Authentication with TLS
2014Transport Layer Security (TLS) mutual authentication, also known as client authentication or two-way Secure Socket Layer (SSL), is part of the TLS handshake process. In one-way TLS, only the server proves its identity to the client; this is mostly used in e-commerce to win consumer confidence by guaranteeing the legitimacy of the e-commerce vendor.
openaire +1 more source
Secured mutual authentication between two entities
2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 2015Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish between genuine and fake. Thus, it is important to mutually authenticate each other.
null Sudhakar K +2 more
openaire +1 more source
Mutual Authentication and Updating the Authentication Key in MANETS
Wireless Personal Communications, 2014Mobile Ad hoc Networks (MANETs) are new wireless networks with a self-configuring and self-maintaining topology, also characterized as dynamic topology. The architecture in MANETs has been introduced few years ago and its main characteristic is that it does not rely on any fixed infrastructure.
openaire +1 more source
Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange
2014Most recent security models for authenticated key exchange (AKE) do not explicitly model the entity authentication, which enables a party to identify its communication peer in specific session. However, it is quite necessary in many real-world applications and is a general way to enhance the security of AKE protocols.
openaire +1 more source
Mutual-Authentication Mechanism for RFID Systems
2006The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable.
Batbold Toiruul +4 more
openaire +1 more source
Ultralightweight RFID Reader-Tag Mutual Authentication
2015 IEEE 39th Annual Computer Software and Applications Conference, 2015In the RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database.
Yu-Chung Huang, Jehn-Ruey Jiang
openaire +1 more source
Exploring the RFID mutual authentication domain
International Journal of Computers and Applications, 2018Mutual Authentication is the initial and the most significant line of defense in any open and trusted network system.
Syed Muhammad Mohsin +4 more
openaire +1 more source

