intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Mutual authentication

Xem 1-9 trên 9 kết quả Mutual authentication
  • The paper also describes a few implementations of ABE applied in the cryptography community and the challenges of integrating ABE into real-world applications. Finally, the paper proposes an implementation of ABE for Android mobile devices. This implementation associated with the Kerberos protocol can be applied to secured data sharing applications. The Kerberos protocol aims at providing mutual authentication for the client server model. Experiments have evaluated the proposed ABE implementation on Android mobile devices along with the Kerberos system.

    pdf11p trinhthamhodang9 04-12-2020 17 0   Download

  • (NB) Giáo trình An toàn mạng cung cấp cho người học các kiến thức: Tổng quan về bảo mật và an toàn mạng, bảo mật với lọc gói ip, internet protocol security, virus và cách phòng chống. Mời các bạn cùng tham khảo!

    pdf80p cuahuynhde999 02-06-2020 80 6   Download

  • In this paper, we deal with the security scheme for communications between ESP8266 modules, which can provide embedded Wi-Fi capabilities at a low cost. Based on an existed security scheme for ESP8266, we proposed an enhanced mutual authentication mechanism and ECDH-key agreement on curve 25519.

    pdf10p viboruto2711 15-05-2019 20 1   Download

  • In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device.

    pdf4p byphasse043256 21-03-2019 26 0   Download

  • Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...

    pdf55p nhanmotchut_3 20-10-2016 59 3   Download

  • This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...

    pdf8p tuanlocmuido 13-12-2012 57 2   Download

  • Hybr idity and Connect ivity br ing act ivit ies and people together, rather than isolate objects and separate functions. These qualities also treat people and nature as symbiot ic—as well as buildings and landscape—rather than opposit ional. Porosity preserves the integr ity of that which is brought together while allowing mutual access through permeable membranes, rather than the modernist at tempt to dismantle boundaries or postmodernist fortiication.

    pdf232p tiramisu0908 25-10-2012 62 3   Download

  • Physical communication channels in wireless technology are inherently insecure. As a wire only has two ends, the wired communication technology has a means of supporting integrity of communication, whereas in wireless communication dedicated technology is needed—even to control a basic point-to-point connection.

    pdf288p khongvannhat 17-09-2012 58 5   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment

    pdf14p sting11 09-03-2012 33 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2