Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Derived unique key per transaction"'
This protocol allows for transaction level authentication using shared secrets and one way hashing. It can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive na
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f0f305e11ad64397ddf86da870c1dfaf
https://doi.org/10.17487/rfc8945
https://doi.org/10.17487/rfc8945
Autor:
Xianwei Zhou, Jian Zhou
Publikováno v:
Wireless Personal Communications. 72:2425-2443
Key management is more difficult in space networks than in ground wireless networks as long time delay, large scale and difficult maintain. The main challenge is how to handle 1-affects- $$n$$ problem,which becomes more serious as space entities spre
Autor:
Amrit Priyadarshi, Pooja Pol
Publikováno v:
2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT).
In Cloud computing and integrity privacy play vital role. Key Aggregation, offer integrity and privacy to user without involving key information each other and every file. Paper follows asymmetric key management, all the information followed by publi
Autor:
R. Sridevi, D. Kalyani
Publikováno v:
ICACCI
In this paper, we propose a robust distributed threshold key transfer protocol or issuing protocol that solves the key escrow problem in identity-based approach. We use threshold cryptographic techniques in each phase of the algorithm such as in syst
Publikováno v:
International Journal Of Engineering And Computer Science.
One Time Password is one of the preferable security techniques to do online transaction. If the security level is compared, it shows the need of improvement in its transaction methods and medium. In this paper, two authorities are considered viz. ban
Autor:
M John Sathya, B S Revathi
Publikováno v:
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS).
sharing data in a secure manner is a key factor in the aspect of data storage. In this project we propose a new system called key aggregate cryptosystem (KAC), which produces constant size aggregate key for efficient data sharing, instead of sharing
Publikováno v:
IOSR Journal of Computer Engineering. 7:55-60
Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Ba
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1039-1051
Provider authentication is necessary in bidirectional broadcasting services, and a digital signature scheme is often used to prevent an adversary from attempting impersonation. The cost of secure signing key management is extremely high. In addition,
Publikováno v:
Advances in Cryptology – ASIACRYPT 2015 ISBN: 9783662487990
ASIACRYPT (2)
ASIACRYPT (2)
Side channels provide additional information to skilled adversaries that reduce the effort to determine an unknown key. If sufficient side channel information is available, identification of the secret key can even become trivial. However, if not eno
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9fd645a8228082e33134b654e4e4868a
https://doi.org/10.1007/978-3-662-48800-3_13
https://doi.org/10.1007/978-3-662-48800-3_13
Autor:
Hung-Yu Chien, Jinn-Ke Jan
Publikováno v:
Computers & Security. 22:523-526
The access privileges in many distributed systems can be effectively organized as a hierarchical tree. Distributing distinct cryptographic keys to distinct entities, according to their privileges, provides a good solution to the hierarchical access c