Mutual authentication

Xem 1-5 trên 5 kết quả Mutual authentication
  • This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...

    pdf8p tuanlocmuido 13-12-2012 15 2   Download

  • Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...

    pdf55p nhanmotchut_3 20-10-2016 1 0   Download

  • Physical communication channels in wireless technology are inherently insecure. As a wire only has two ends, the wired communication technology has a means of supporting integrity of communication, whereas in wireless communication dedicated technology is needed—even to control a basic point-to-point connection.

    pdf288p khongvannhat 17-09-2012 30 5   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment

    pdf14p sting11 09-03-2012 12 2   Download

  • Hybr idity and Connect ivity br ing act ivit ies and people together, rather than isolate objects and separate functions. These qualities also treat people and nature as symbiot ic—as well as buildings and landscape—rather than opposit ional. Porosity preserves the integr ity of that which is brought together while allowing mutual access through permeable membranes, rather than the modernist at tempt to dismantle boundaries or postmodernist fortiication.

    pdf232p tiramisu0908 25-10-2012 38 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản