66,142 Hits in 5.2 sec

Continuous Key Agreement with Reduced Bandwidth [chapter]

Nir Drucker, Shay Gueron
2019 Lecture Notes in Computer Science  
Continuous Key Agreement (CKA) is a two-party procedure used by Double Ratchet protocols (e. g., Signal).  ...  They mention that the bandwidth can be reduced when using an ElGamal KEM (which is not quantum-safe).  ...  Continuous Key Agreement (CKA) A CKA (roughly) models the public-key ratchets in a DR protocol. It can use a PKE of choice and in particular a KEM.  ... 
doi:10.1007/978-3-030-20951-3_3 fatcat:zo63knmsq5dmrnf7o6mv2wzcay

Enhanced authentication and key agreement procedure of next generation evolved mobile networks

Masoumeh Purkhiabani, Ahmad Salahi
2011 2011 IEEE 3rd International Conference on Communication Software and Networks  
with contrast to Universal Mobile Terrestrial System-Authentication and Key Agreement( UMTS-AKA), then, offers a new improvement protocol which increases performance of authentication procedure.  ...  In this research first explain evolved authentication and key agreement protocol for next generation Long term evolution/ System Architecture Evolution( LTE/SAE )networks and compared its enhancements  ...  The mechanism for authentication as well as key generation in E-UTRAN is called EPS Authentication and Key Agreement (EPS AKA).  ... 
doi:10.1109/iccsn.2011.6014956 fatcat:ohlhh3vpczdtlejvbq4nsrdaii

Securing SDN Southbound and Data Plane Communication with IBC

JunHuy Lam, Sang-Gon Lee, Hoon-Jae Lee, Yustus Eko Oktian
2016 Mobile Information Systems  
We also analyze the TLS-secured Message Queuing Telemetry Transport (MQTT) message exchanges to find out the possible bandwidth saved with IBC.  ...  The agreed protocol, OpenFlow, suggests securing the southbound communication with Transport Layer Security (TLS).  ...  Besides that, the IBC key agreement protocol reduces the bandwidth consumption as compared to the TLS for no certificate exchanges will be required.  ... 
doi:10.1155/2016/1708970 fatcat:ynziyoqfinbm7jp6bv522kzaaa

A secure group based authentication protocol for machine to machine communications in LTE-WLAN interworking architecture

Mariya Ouaissa, Abdallah Rhattoy
2019 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, we propose a group based authentication and key agreement protocol for machine type communications combining Elliptic Curve based Diffie-Hellman (ECDH) on the Extensible Authentication Protocol  ...  Compared to EAP-AKA and other existing authentication protocols, our solution provides increased security against various malicious activities and better performance in terms of signaling overhead, bandwidth  ...  For key agreement because all keys used among entities are computed without being transmitted over any insecure communication channels, the key agreement procedure is secure whether between the MTC device  ... 
doi:10.11591/ijeecs.v16.i2.pp848-859 fatcat:e5pksovi2ba6tmxsmwdi36c4gy

New Authentication and Key Agreement Protocol for LTE-WLAN Interworking

Ahmed H.Hassanein, Ahmed A. Abdel Hafez, Abd El-Hamid A. Gaafar
2013 International Journal of Computer Applications  
To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used.  ...  This paper analyzes vulnerabilities in LTE-WLAN interworking and proposes a new authentication and key agreement protocol based on EAP-AKA. Keywords LTE, Interworking, 3G-WLAN.  ...  An attacker can impersonate an access point (AP) to receive EAP success message with master session key (MSK) from AAA server, causes man-in-middle attack. Bandwidth Consumption.  ... 
doi:10.5120/10036-4937 fatcat:2vb4nla4zvf33a4mh2kgvch6c4

Optimizing an Efficient Use of Internet Bandwidth for Higher Learning Institutions in Ghana

Lewis M. Selby, Anthony Bawa
2018 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
In looking at the cost we also included the bandwidth packages offered, the type of Internet connection and the service level agreement with the ISPs.  ...  One of the key objectives of this study is to design and simulates an efficient Internet bandwidth usage for Higher Learning Intuitions.  ...  the services level agreement with their ISPs.  ... 
doi:10.32628/cseit183819 fatcat:or7hmnjrw5h5xjwwrcc5ezmauy

Efficient Data Memory Usages of 3GPP Authentication and Key Agreement Protocol

Minha Park, Yeog Kim, Okyeon Yi
2014 International Journal of Security and Its Applications  
To achieve this, many researches have been studied about 3 rd Generation Partnership Project Authentication and Key Agreement (3GPP-AKA).  ...  Others studies also proposed similar protocol, but the proposed protocol is more efficiency with reducing memory size.  ...  Proposed Protocol Full-Authentication and Key Agreement Figure 2.  ... 
doi:10.14257/ijsia.2014.8.1.04 fatcat:4xh27lzxpzax7bipykvrfgv7ty

Bandwidth trading-a business case for ASON?

A. Iselt, A. Kirstadter, R. Chahine
2004 11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004,  
During the last years bandwidth has been becoming more and more a commodity. Several network operators compete for customers with comparable offerings.  ...  Moreover we show that with novel automation technologies like GMPLS or ASON/ASTN some of these problems can be alleviated.  ...  In the future, the virtual market places will enable selling and leasing of bandwidth making room for bandwidth brokerage in the telecommunication industry.  ... 
doi:10.1109/netwks.2004.240775 fatcat:erjsv6jqxvbv5oyqf37qx35gj4

Trust and Privacy Based Authentication Method for Vertical Handoff Decision in Heterogeneous Network

2019 International Journal of Engineering and Advanced Technology  
Next generation wireless networks involve diverse wireless access technologies to support multimedia services to the roaming users with different Quality of Service constraints at anytime and anywhere.  ...  Therefore, Trust and Privacy based Multi-attribute Vertical Handoff (TPMVHO) decision algorithm along with Hybrid Genetic Cuckoo Search algorithm to optimize the attributes weight is proposed to select  ...  It helped in integrating strong authentication during handover process with reduced call drops and packet losses.  ... 
doi:10.35940/ijeat.a2968.109119 fatcat:n3q5djiws5eu5fpye4ay6okcvu

Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

K. A. Patel, J. F. Dynes, M. Lucamarini, I. Choi, A. W. Sharpe, Z. L. Yuan, R. V. Penty, A. J. Shields
2014 Applied Physics Letters  
We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing.  ...  The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25 km, obtained in the presence of data lasers launching conventional 0 dBm power.  ...  Theoretical simulation, shown as solid lines in Fig. 3 , is in excellent agreement with experimental results.  ... 
doi:10.1063/1.4864398 fatcat:ydsfsbipijdixihmhgbxryhzsm

Demonstration of a Flexible Bandwidth Optical Transmitter/Receiver System Scalable to Terahertz Bandwidths

D. J. Geisler, N. K. Fontaine, R. P. Scott, S. J. B. Yoo
2011 IEEE Photonics Journal  
phase-shifted keying (BPSK), coherent wavelength division multiplexing (CoWDM) with 5 and 15 BPSK subcarriers, and orthogonal frequency division multiplexing (OFDM) with 54 BPSK subcarriers.  ...  Measurements were performed using an OAWM receiver with two 30-GHz spectral slices using 15 GHz of analog bandwidth.  ...  Fig. 4(b) shows the frequency domain of the 60-GHz data waveform, which shows close agreement with the target values.  ... 
doi:10.1109/jphot.2011.2171931 fatcat:oe57tpwwybas5a2j3fddnkaryq

Overview Of Eso Large Single Dish Study

Leonardo Testi
2018 Zenodo  
Origins of galaxies Ø Follow the cosmic evolution of key bio-elements from the beginning of galaxy formation (z>6) through the peak of star formation (z=2-4) by imaging key cooling lines, both atomic (  ...  Preferably a 40m class with state of the art line and continuum cameras. III. Compatible with recommendations I and II, ESO should maintain the APEX capabilities at least up to the early 2020s  ...  The main bands considered for upgrades are Bands 7, 6, 3 and 9, with Band 7 and 6 deemed to have equal priority.  ... 
doi:10.5281/zenodo.1159082 fatcat:xss3zbk7qnemhc4etehsg4swaa

NIMSA: Non-Interactive Multihoming Security Authentication Scheme for vehicular communications in Mobile Heterogeneous Networks [article]

Zongzheng Wang, Ping Dong
2022 arXiv   pre-print
It is unsuitable for heterogeneous wireless scenarios with a high packet loss rate and limited bandwidth resources.  ...  Our scheme adopts an identity-based non-interactive key agreement strategy to avoid the interaction of signaling information, which is lightweight and has good support for mobile and multipath parallel  ...  Due to identity-based noninteractive key exchange characteristics, our proposed scheme can significantly reduce the delay and bandwidth overhead.  ... 
arXiv:2202.03808v1 fatcat:pyepoehf5rcy3ooffmgk37j4zi

Efficient and Secure Authentication and Key Agreement Protocol

Jaafer AL-Saraireh
2011 International Journal of UbiComp  
In the UMTS Authentication and Key Agreement (AKA) protocol only the home network can generate authentication vectors to its subscribers.  ...  A security analysis and comparison with related work shows that E-AKA is more efficient and a secure authentication is achieved.  ...  But with this improvement by [3, 7] are still there are bandwidth consumption.  ... 
doi:10.5121/iju.2011.2201 fatcat:mlirdzuyjncf7cj5ibsa4p2buu

Page 436 of SMPTE Motion Imaging Journal Vol. 92, Issue 4 [page]

1983 SMPTE Motion Imaging Journal  
Forty channels have been allocated with a spacing of about 19.2 MHz, but the plan allows for each channel to be oc- cupied by a frequency-modulated television signal with a bandwidth of 27 MHz.  ...  Existing receivers would be presented with a normal PAL signal, except that the luminance bandwidth would be restricted to about 3.5 MHz.  ... 
« Previous Showing results 1 — 15 out of 66,142 results