• Aucun résultat trouvé

Authentication protocol

Verification of two versions of the challenge handshake authentication protocol (CHAP)

Verification of two versions of the challenge handshake authentication protocol (CHAP)

... Handshake Authentication Protocol, CHAP, is a protocol used to authenticate both ends of a communication ...Such authentication protocol is intended for use primarily by hosts and ...

19

A Lightweight Mutual Authentication Protocol for the IoT

A Lightweight Mutual Authentication Protocol for the IoT

... an authentication mechanism for the IEEE ...Extensible Authentication Protocol ...an authentication server (Remote Authen- tication Dial-In User Service server) is involved to check the ...

11

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

... An authentication protocol, at the application layer, takes place between an AAA client, ...requests authentication to at least a threshold number of ...

6

Serverless lightweight mutual authentication protocol for small mobile computing devices

Serverless lightweight mutual authentication protocol for small mobile computing devices

... al.’s protocol was found to be vulnerable to traceability, impersonation and privacy attacks by the authors of ...RFID authentication protocol which improved the computational performance of Tan et ...

6

Theoretical security evaluation of the Human Semantic Authentication protocol

Theoretical security evaluation of the Human Semantic Authentication protocol

... 3 The Human Semantic Authentication protocol 3.1 Definition In (Salembier et al., 2016), the authors present the HSA protocol. They claim to be a mix between recall and cued-recall based schemes. ...

9

H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks

H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks

... In wireless sensors networks (WSN), broadcast communications are common usage to collect data from sensors, distribute software update or routing update information, etc. As an example, once nodes are deployed, the base ...

8

The 5G-AKA Authentication Protocol Privacy

The 5G-AKA Authentication Protocol Privacy

... such protocol is the Authentication and Key Agreement ( AKA ) protocol, which allows a subscriber and its service provider to establish a shared secret key in an authenticated ...AKA protocol, ...

17

Authentication protocol using trapdoored matrices

Authentication protocol using trapdoored matrices

... Since our protocol is based on a very parallelizable problem (matrix-vector multiplication) and smart cards have very limited computational capabilities, we assume th[r] ...

52

Authentication and access control based on distributed ledger technology

Authentication and access control based on distributed ledger technology

... An authentication method for Wi-Fi hotspot access has been proposed by Niu et ...CoinsShuffle protocol and Colored Coins inspired the development of this ...Another authentication method in ...

9

A lattice based authentication for low-cost RFID

A lattice based authentication for low-cost RFID

... mutual authentication protocol especially designed for low- cost RFID systems and based on adaptation that we have introduced on NTRU public key cryptosystem on the tag ...our protocol is the first ...

7

A new authentication method based on cryptographic identifiers CGAs

A new authentication method based on cryptographic identifiers CGAs

... using CGA, we adapted this authentication protocol to define a new EAP method based on CGA, and a way to integrate it into HIP. A validation of EAP-CGA is performed. This document is organised as follows. ...

30

Low Latency of Re-Authentication During Handover : Re-Authentication Using a Signed Token in Heterogeneous Wireless Access Networks

Low Latency of Re-Authentication During Handover : Re-Authentication Using a Signed Token in Heterogeneous Wireless Access Networks

... and Authentication, Authorization and Accounting Framework (AAA, 2000) which is based on Extensible Authentication Protocol (EAP ...client authentication, how this token save the context of a ...

8

Multihop Node Authentication Mechanisms for Wireless Sensor Networks ⋆

Multihop Node Authentication Mechanisms for Wireless Sensor Networks ⋆

... an authentication model that aims at reducing overhead for the re- authentication of sensor ...the protocol only works well when the fixed node is in direct range with the base station, the initial ...

15

A Unified Authentication Framework for Accessing Heterogeneous Web Services

A Unified Authentication Framework for Accessing Heterogeneous Web Services

... distinct authentication schemes, assuming it is unrea- sonable to expect to be able to change the end service to suit our authentication, but an unnecessary load on the end user to submit multiple ...

8

An extensive formal analysis of multi-factor authentication protocols

An extensive formal analysis of multi-factor authentication protocols

... an authentication protocol, as also em- phasized in [6], a key requirement should be ...factor authentication on these particular ...factor authentication will be ...

16

An EAP-EHash authentication method adapted to resource constrained terminals

An EAP-EHash authentication method adapted to resource constrained terminals

... needing authentication integrate EAP for authen- tication ...classical authentication protocols were adapted as EAP ...handshake authentication protocol (CHAP) [ 7 ], subscriber identity ...

15

Evaluation of RAIN RFID authentication schemes

Evaluation of RAIN RFID authentication schemes

... the authentication phase of cryptographic suites XOR, AES, PRESENT and Cryp- ...the authentication process to be considered for secure applications conformed to RFID RAIN ...

9

Authentication and consensus overhead in vehicular ad hoc networks

Authentication and consensus overhead in vehicular ad hoc networks

... In order to secure vehicular communications, Wireless Ac- cess in Vehicular Environments (WAVE) architecture man- dates the use of PKI mechanisms, where service appli- cation messages are encrypted and vehicle safe-ty ...

15

An EAP ID-Based authentication method for wireless networks

An EAP ID-Based authentication method for wireless networks

... the authentication method which is going to be used ...the authentication method proposed by the supplicant STA, it acts as a passthrough server to transmit STA authenti- cation messages to a backend ...

9

A text-independent speaker authentication system for mobile devices

A text-independent speaker authentication system for mobile devices

... the location may be adjusted, but for our prototype, we used a radius of 200 and 500 m. This double validation (i.e., voice and location) allows the system to be much more robust against fraudulent authentication ...

22

Show all 761 documents...

Sujets connexes