Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Secure Remote Password protocol"'
Autor:
Ravi Sharma, Balázs Villányi
Publikováno v:
Internet of Things and Cyber-Physical Systems, Vol 2, Iss , Pp 170-179 (2022)
When the Internet of Things (IoT) is used in a typical manufacturing system, the industrial plant can be controlled remotely through the Internet. This enables manufacturing and execution systems to obtain real-time work orders directly from the Ente
Externí odkaz:
https://doaj.org/article/2b22f3ca099e478d9e2fdb34be17d387
Publikováno v:
Sensors, Vol 15, Iss 10, Pp 26621-26642 (2015)
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in i
Externí odkaz:
https://doaj.org/article/c0c595c0fee345ffa1f30f53dd713537
Autor:
Andy Russon
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
Applied Cryptography and Network Security
Kazue Sako; Nils Ole Tippenhauer. Applied Cryptography and Network Security, 12727, Springer International Publishing, pp.49-75, 2021, Lecture Notes in Computer Science, 978-3-030-78374-7. ⟨10.1007/978-3-030-78375-4_3⟩
ACNS (2)
Applied Cryptography and Network Security
Kazue Sako; Nils Ole Tippenhauer. Applied Cryptography and Network Security, 12727, Springer International Publishing, pp.49-75, 2021, Lecture Notes in Computer Science, 978-3-030-78374-7. ⟨10.1007/978-3-030-78375-4_3⟩
19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II; International audience; The Secure Remote Password protocol is a password-based authenticated key-exchange between two parties. One advantage is to p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2cd3d5e7d7dd0054de1e4c082f5ba0b8
https://doi.org/10.1007/978-3-030-78375-4_3
https://doi.org/10.1007/978-3-030-78375-4_3
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Richard Chang, Erin Lanus, Cyrus J. Bonyadi, Ian Blumenfeld, Edward Zieglar, Moses Liskov, Alan T. Sherman, Ryan Wnuk-Fink, Mario Yaksetig, Enis Golaszewski
Publikováno v:
Logic, Language, and Security ISBN: 9783030620769
Logic, Language, and Security
Logic, Language, and Security
We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3).
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9a1bb6da19108f6ac36714e22ae6d7f1
https://doi.org/10.1007/978-3-030-62077-6_9
https://doi.org/10.1007/978-3-030-62077-6_9
Publikováno v:
Information Security and Cryptology ISBN: 9783319751597
Inscrypt
Inscrypt
Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features. Compared with basic PAKE protocols, SRP does not requ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::355f1fd26a5ebaa62949b7db4a0131cd
https://doi.org/10.1007/978-3-319-75160-3_8
https://doi.org/10.1007/978-3-319-75160-3_8
Publikováno v:
IEEE Systems Journal. 8:629-640
A smart grid (SG) consists of many subsystems and networks, all working together as a system of systems, many of which are vulnerable and can be attacked remotely. Therefore, security has been identified as one of the most challenging topics in SG de
Autor:
Feng Hao
Publikováno v:
CIT
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence can be easily thwarted by adding a public key validation: verifying the
Autor:
M.T. El-Hadidi, A.A. Sayegh
Publikováno v:
SecureComm
This paper presents a novel solution to previously published weaknesses identified within the Bluetooth initialization key generation process. The current initialization key generating protocol will be replaced by a more robust technique, the Secure