搜索结果: 1-15 共查到“军队指挥学 mutual authentication”相关记录15条 . 查询时间(0.14 秒)
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
RFID scheme security privacy
2019/1/26
With the large scale adoption of the Radio Frequency Identification (RFID) technology, a variety of security and privacy risks need to be addressed. Arguably, the most general and used RFID security a...
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
TLS key exchange authentication
2016/7/20
We study the question of how to build "compilers" that transform a unilaterally authenticated (UA) key-exchange protocol into a mutually-authenticated (MA) one. We present a simple and efficient compi...
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol
identification protocols public-key cryptography
2014/3/5
Radio Frequency IDentification (RFID) systems are gaining enormous interests at industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home...
Fully Deniable Mutual Authentication Protocol Based on RSA Signature
Deniability RSA Signature
2014/3/6
Deniable authentication protocols allow a sender to authenticate a receiver, in a way that the receiver cannot convince a third party that such authentication (or any authentication) ever took place. ...
An efficient RFID mutual authentication scheme based on ECC
applications / RFID location privacy forward secrecy mutual authentication
2012/3/27
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks...
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
RFID Authentication Desynchronization Attack Tag Impersonation Attack
2011/7/25
Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc.
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
cryptographic protocols / RFID Authentication Desynchronization Attack Tag Impersonation Attack Reader Impersonation Attack
2012/3/27
Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive attacks such as forgery,...
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
ID-based Mutual authentication Key agreement Elliptic curve Cryptosystem
2010/11/26
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s p...
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
Authentication Security Cryptanalysis card Attacks
2010/7/13
The weakness of an exquisite authentication scheme based on smart cards and passwords proposed by Liao et al. [C. H. Liao, H. C. Chen, and C. T. Wang, An Exquisite Mutual Authentication Scheme with Ke...
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
ID-based Mutual authentication Key agreement
2010/2/1
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication
and key agreement scheme for mobile devices on elliptic curve cryptosystem. In this paper, we
show that Yoon et al.’s ...
Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
ID-based mutual authentication key agreement
2009/11/18
Most recently, Yang et al proposed an ID-based remote mutual authentication with
key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of
Computer and Security. In this p...
Password Based Key Exchange With Mutual Authentication
Password Based Key Exchange Mutual Authentication
2009/3/27
A reasonably efficient password based key exchange (KE) protocol with provable security
without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Lindell
[13]. Howeve...
Pairing based Mutual Authentication Scheme Using Smart Cards
Mutual authentication Bilinear pairings smart card
2008/11/18
Bilinear pairings based mutual authentication scheme using smart card is presented. We propose a novel technique of using two different servers, one for registration and other for authentication. The ...
Clone Resistant Mutual Authentication for Low-Cost RFID and Contactless Credit Cards
EPC RFID Cloning Mutual Authentication
2008/8/29
With Radio Frequency Identification (RFID) tags being used to secure contactless
credit cards, great benefits but also serious security and information privacy issues have
arisen. Recently many atte...
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
mutual authentication RFID system binary search quadratic residues
2008/8/22
In 2004, Ari Juels [1] proposed a Yoking-Proofs protocol for RFID systems. The aim is to permit tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are pote...