搜索结果: 1-15 共查到“军事学 Authentication scheme”相关记录59条 . 查询时间(0.125 秒)
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
IoV security analysis matrix encryption
2019/7/23
Internet of Things (IoT) has various applications such as healthcare, supply chain, agriculture, etc. Using the Internet of Vehicles(IoV) to control traffic of the cities is one of the IoT application...
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Secure mobile banking Two factor authentication Mutual authentication
2018/11/13
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments. Consumers depen...
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
LTE Handover authentication scheme Proxy Signature
2018/11/12
Designing a secure and efficient handover authentication scheme has always been a concern of cellular networks especially in 4G Long Term Evolution (LTE) wireless networks. What makes their handover s...
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
elliptic curve cryptosystem smart cards hash functions
2017/6/6
Nowadays, IT enabled service gain more attention due to easy to access resources from remote place. IT enabled services are extend their service to all kind of business and personal related applicatio...
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme
cryptographic protocols privacy requirements
2016/12/10
In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy ve...
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
user authentication key agreement cryptanalysis
2016/1/27
Recently, Farasha et al. proposed an efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the Internet
of Things environment. By using BAN-lo...
Improved on an improved remote user authentication scheme with key agreement
user authentication key agreement cryptanalysis
2016/1/27
Recently, Kumari et al. pointed out that Chang et al.’s scheme “Untraceable
dynamic-identity-based remote user authentication scheme with verifiable password
update” not only has several drawbacks, ...
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
cryptographic protocols wireless sensor networks
2016/1/26
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication
scheme based on Tso et al.’s IBS scheme with message recovery to achieve security
requirements in wireless sensor n...
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
cryptographic protocols authentication schemes
2016/1/23
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
cryptographic protocols Authentication scheme
2016/1/9
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An proposed user authentication scheme improved Das’s ...
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Cryptographic secret keys Das’s scheme
2016/1/9
Password-based authentication schemes are convenient, but vulnerable to simple dictionary attacks. Cryptographic secret keys are safe, but difficult to memorize. More recently, biometric information h...
Security Analysis of an Authentication Scheme Using Smart Cards
Smart Cards Security Analysis
2016/1/5
In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme using smart cards. They claimed that their scheme is secure against various attacks. In this paper, we improve th...
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Cryptanalysis Remote User Authentication Key Agreement
2015/12/30
In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user authentication
scheme with key agreement using smart cards. They claimed that their scheme is efficient
and secure...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Security Attacks Markov Chain Authentication Protocol
2015/12/29
Session key agreement protocol using smart card is extremely popular in clientserver
environment for secure communication. Remote user authentication protocol plays a
crucial role in our daily life ...