Results 221 to 230 of about 3,852 (258)
Some of the next articles are maybe not open access.

Mutual entity authentication for LTE

2011 7th International Wireless Communications and Mobile Computing Conference, 2011
In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses.
openaire   +1 more source

Mutual Authentication in Wireless Mesh Networks

2008 IEEE International Conference on Communications, 2008
A wireless mesh network (WMN) is a new wireless network technology and there is a trend to adopt the technology to build commercial mobile ad hoc networks. Since a WMN is such a network without fixed infrastructure and is operated in an open medium, any user within the range covered by radio wave may access the network.
Y. Fu, J. He, R. Wang, G. Li
openaire   +1 more source

Mutual Authentication using Fuzzy Fingerprint Vault

2006 International Conference on Computational Intelligence and Security, 2006
Biometric-based authentication can provide strong security gua rantee about the identity of users. However, security/privacy of biometric data is particularly important as compromise of the data will be permanent. On the contrary, the security of a typical PKI-based user authentication solution is deteriorated by a simple password once the private key ...
Daesung Moon   +3 more
openaire   +1 more source

Mutual Authentication with TLS

2014
Transport Layer Security (TLS) mutual authentication, also known as client authentication or two-way Secure Socket Layer (SSL), is part of the TLS handshake process. In one-way TLS, only the server proves its identity to the client; this is mostly used in e-commerce to win consumer confidence by guaranteeing the legitimacy of the e-commerce vendor.
openaire   +1 more source

Secured mutual authentication between two entities

2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 2015
Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish between genuine and fake. Thus, it is important to mutually authenticate each other.
null Sudhakar K   +2 more
openaire   +1 more source

Mutual Authentication and Updating the Authentication Key in MANETS

Wireless Personal Communications, 2014
Mobile Ad hoc Networks (MANETs) are new wireless networks with a self-configuring and self-maintaining topology, also characterized as dynamic topology. The architecture in MANETs has been introduced few years ago and its main characteristic is that it does not rely on any fixed infrastructure.
openaire   +1 more source

Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange

2014
Most recent security models for authenticated key exchange (AKE) do not explicitly model the entity authentication, which enables a party to identify its communication peer in specific session. However, it is quite necessary in many real-world applications and is a general way to enhance the security of AKE protocols.
openaire   +1 more source

Mutual-Authentication Mechanism for RFID Systems

2006
The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable.
Batbold Toiruul   +4 more
openaire   +1 more source

Ultralightweight RFID Reader-Tag Mutual Authentication

2015 IEEE 39th Annual Computer Software and Applications Conference, 2015
In the RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database.
Yu-Chung Huang, Jehn-Ruey Jiang
openaire   +1 more source

Exploring the RFID mutual authentication domain

International Journal of Computers and Applications, 2018
Mutual Authentication is the initial and the most significant line of defense in any open and trusted network system.
Syed Muhammad Mohsin   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy