Results 1 - 10
of
16
Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs
"... is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.& ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al
Y.: Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
- In: Proceedings of 30th International Performance Computing and Communications Conference (IPCCC
, 2011
"... Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme has already been shown vulnerable to the off-line password guessing attack by Tapiador et a ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme has already been shown vulnerable to the off-line password guessing attack by Tapiador et
Cryptanalysis of a Markov Chain Based User Authentication Scheme
"... Abstract- Session key agreement protocol using smart card is extremely popular in client-server environment for secure communication. Remote user authentication protocol plays a crucial role in our daily life such as e-banking, bill-pay, online games, e-recharge, wireless sensor network, medical sys ..."
Abstract
- Add to MetaCart
Abstract- Session key agreement protocol using smart card is extremely popular in client-server environment for secure communication. Remote user authentication protocol plays a crucial role in our daily life such as e-banking, bill-pay, online games, e-recharge, wireless sensor network, medical
Dynamic Encryption Key based Smart Card Authentication Scheme
"... In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or ..."
Abstract
- Add to MetaCart
or the other possible attack. This paper describes a new smart card authentication scheme using symmetric key cryptography, which covers all the identified security pitfalls and satisfies the needs of a user. Its security is based on encrypting the contents of all the communicating messages exchanged between
doi:10.1093/comjnl/bxm030 Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers
"... An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. ..."
Abstract
- Add to MetaCart
An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment
Advance Access publication on June 27, 2007 doi:10.1093/comjnl/bxm030 Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers
"... An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. ..."
Abstract
- Add to MetaCart
An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment
Secure communication in digital TV broadcasting
- International Journal of Computer Science and Network Security
, 2008
"... To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (program content) with some secure measures such as ECM and EMM via using control words, and send the stream to conditional access system (CAS) in the set-top box (STB). Smart card is used to decrypt the ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
communication between smart card and STB. Then, it proposes a secure mutual authentication and a key agreement protocol between smart card and STB. The proposed scheme is more efficient and secure than previously proposed schemes in that it eliminates time-consuming exponentiation operation. The proposed scheme
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any
Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture
- The 2012 International Conference on Information and Communications Security (ICICS 2012),485 Hong Kong
, 2012
"... Abstract. Near Field Communication (NFC) has reinvigorated the multi-application smart card initiative. The NFC trials are relying on an ex-tension of Issuer Centric Smart Card Model (ICOM) referred as Trusted Service Manager (TSM) architecture, which may create market segrega-tion. Where the User C ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
flexibility, robust-ness, and scalability. To support the CASC framework in this paper, we propose an application installation protocol that provides entity authen-tication, trust assurance and validation, mutual key and contractual-agreement generation. The protocol is compared with existing protocols on its
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
Results 1 - 10
of
16