Filters








19,179 Hits in 3.4 sec

Public Key Authentication with Memory Tokens [chapter]

Camille Vuillaume, Katsuyuki Okeya, Erik Dahmen, Johannes Buchmann
2009 Lecture Notes in Computer Science  
Our technique is particularly attractive on platforms where memory is already available, since it can be implemented at practically no cost, without any CPU, and with an extremely simple memory access  ...  We propose a very low-cost authentication scheme based on Merkle signatures, which does not require any computation on the prover side, but instead, has moderate memory requirements.  ...  More precisely, we may assume that tokens store their private key, public key and a certificate thereof.  ... 
doi:10.1007/978-3-642-00306-6_7 fatcat:cmywcyvkx5esxpngh3cus6x2li

Protecting applications with transient authentication

Mark D. Corner, Brian D. Noble
2003 Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03  
We solve this problem with Transient Authentication, in which a small hardware token continuously authenticates the user's presence over a short-range, wireless link.  ...  Applications can be protected transparently by encrypting in-memory state when the user departs and decrypting this state when the user returns.  ...  Mutual authentication can be provided with publickey cryptography [23] . In public-key systems, each principal has a pair of keys, one public and one secret.  ... 
doi:10.1145/1066116.1066117 fatcat:57tn6pfll5gztktuozzqq4ywsu

Mobile Device Security Using Transient Authentication

A.J. Nicholson, M.D. Corner, B.D. Noble
2006 IEEE Transactions on Mobile Computing  
Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence.  ...  We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep.  ...  Tokens bind to devices by negotiating a session key via public-key encryption techniques. Once a token is bound to a device, it performs key decryption on its behalf.  ... 
doi:10.1109/tmc.2006.169 fatcat:nhkpbwy52fgvvequ3vdlly4pqy

LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network [chapter]

Riaz Ahmed Shaikh, Sungyoung Lee, Mohammad A. U. Khan, Young Jae Song
2006 Lecture Notes in Computer Science  
LSec provides authentication and authorization of sensor nodes with simple secure key exchange scheme.  ...  LSec is memory efficient that requires 72 bytes of memory storage for keys. It only introduces 74.125 bytes of transmission and reception cost per connection. 1  ...  A and BS EK A + = Encrypt with the public key of node A EK B + = Encrypt with the public key of node B EK sk = Encrypt with the shared secret key EK G = Encrypt with group key EK CH-BS = Encrypt with the  ... 
doi:10.1007/11872153_32 fatcat:gcywihxem5bq7oafj3qrn4ksbq

Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment

Timothy Claeys, Franck Rousseau, Bernard Tourancheau
2017 2017 International Workshop on Secure Internet of Things (SIoT)  
In this paper we propose a new authorization and authentication framework for the IoT that combines the security model of OAuth 1.0a with the lightweight building blocks of ACE.  ...  Finally, we propose an alternate key establishment scheme for use cases where devices cannot directly communicate.  ...  The latter stores the client's public key or a key identifier of the client's public key for which the token is created. The full public key can be presented by a COSE key object.  ... 
doi:10.1109/siot.2017.00006 dblp:conf/siot/ClaeysRT17 fatcat:dxakuxhfobcw7bhpzm2p4fdy34

OPERA: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory

Ki-Woong PARK, Sung Hoon BAEK
2017 IEICE transactions on information and systems  
It newly introduces a concept of 'one-time-readable memory(ORM)' and 'digital token' which is a unit of self-verifiable digital cash.  ...  By investigating existing online and offline payment systems, we identify three key challenges for building a digital cash transaction system with core features of the offline cash transactions: self-verifiability  ...  The payee can use the public key of the issuer (PK c ) to verify that the tokens have been received.  ... 
doi:10.1587/transinf.2016inp0008 fatcat:w6gim4xopzgabbivguf62on36a

A Secure RFID Ticket System for Public Transport [chapter]

Kun Peng, Feng Bao
2010 Lecture Notes in Computer Science  
A secure RFID ticket system for public transport is proposed in this paper.  ...  It supports security properties including secure authentication, unforgeability, correct billing and privacy and can prevent various attacks.  ...  (a) The vender machine generates 2k probabilistic random encryptions of 0 using the database authorities' public key: e 0 , e 1 , . . . , e 2t−1 .  ... 
doi:10.1007/978-3-642-13739-6_27 fatcat:xqcnms35tzhghmomybgxwkkcgi

A Session Key Based Security Mechanism for Cyber Physical System [chapter]

Sandip Thite, J. Naveenkumar
2021 Advances in Parallel Computing  
This paper proposed session key-based security mechanism which is used for the prevention of cyber-attacks and authentication of cyber devices.  ...  Step 7: Newly generated Authentication token (AT D ') compare with Authentication token (AT D ) sent by smart device.  ...  Step 14: Newly generated Authentication token (AT M ') compare with Authentication token (AT M ) sent by Microcontroller.  ... 
doi:10.3233/apc210201 fatcat:vslcugxy3jghdfrtdlhz64sbwa

A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography

Yoon-Su Jeong, Yong-Tae Kim
2015 Journal in Computer Virology and Hacking Techniques  
Unlike most HDFS authentication protocols adopting public key exchange approaches, the proposed scheme uses the hash chain of keys.  ...  The proposed scheme allows HDFS clients to be authenticated by the datanode via the block access token.  ...  Compared to HDFS with public keybased authentication, the proposed scheme requires much less memory.  ... 
doi:10.1007/s11416-014-0236-5 fatcat:5b3nkuceanfqziayuiibf67jle

Four Factor Secure Authentication and Authorization for Economic Grid

M. Victor Jose, V. Seenivasagam
2014 Research Journal of Applied Sciences Engineering and Technology  
IP address spoofing is overcome by using Secret Token. This Secret token is generated using UUID of operating System, mother board serial number and MAC address.  ...  This private grid is simulated in GridSim Toolkit 5.2 with various criteria and the results are verified and displayed.  ...  Whichever (public/private) key encrypts your data, the other key is required to decrypt the data. A message encoded with the public key, can only be decoded with the private key.  ... 
doi:10.19026/rjaset.7.523 fatcat:4nmqisaxlnesvcqecmrvft6gs4

A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices – An Initial Prototype

K. A. Rafidha Rehiman, S. Veni
2016 Indian Journal of Science and Technology  
A smart object with enough memory is capable to recognize and store information about  ...  IoT facilitated the interaction of human with anyone over the world with a smart sensor device.  ...  The authentication mechanisms are mainly classified into private key based, public key based and one time signature based.  ... 
doi:10.17485/ijst/2016/v9i9/86791 fatcat:b4zqqny73fh6lceqwrq73bz24u

Key management for decentralized computer network services

L. Harn, Hung-Yu Lin
1993 IEEE Transactions on Communications  
Incorporating smart card technologies and master key concept, this letter proposes an efficient scheme to solve the key management problem in such multiservice environments.  ...  When a computer network grows larger and adds more services offered by different providers, each user may have to keep many keys for different services.  ...  the master key with public information.  ... 
doi:10.1109/26.250825 fatcat:lnbhbova3ba3nncrxeygtklzs4

Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs

Javier Arcenegui, Rosario Arjona, Roberto Román, Iluminada Baturone
2021 Sensors  
The link between tokens and devices is difficult to break and can be traced during their lifetime, because devices execute a secure boot and carry out mutual authentication processes with new owners and  ...  owners and users, and they operate dynamically with several modes associated with their token states.  ...  From the private key, the public key and the address are derived. Authenticity, integrity, and non-repudiation are ensured only if the private key is kept secret and is properly protected.  ... 
doi:10.3390/s21093119 pmid:33946227 fatcat:bt3vg5ln5jg3dgu44nrwpfeebu

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems [chapter]

Yongge Wang
2017 Lecture Notes in Computer Science  
Though smart card based authentication techniques have been a successful solution for addressing key management challenges in several cryptographic authentication systems, they may not be applicable to  ...  In this paper, we review the security requirements for smart grid authentication systems and propose trust models for smart grid remote authentication systems.  ...  Public key based scheme: PSCAb In this section, we introduce a public key based token authentication scheme with bilinear groups: PSCAb, it is based on the identity based key agreement protocol from IEEE  ... 
doi:10.1007/978-3-319-61437-3_7 fatcat:7inbc2l7efgsjces7v33jhrhrq

Digital Content Protection in Cloud Environments using Near Field Communication

D.Jothi priya, A. Akila
2016 International Journal of Web Technology  
In addition, we use the challenge-response protocol and the message authentication code to achieve mutual authentication, and generate the session key to protect the transmitted digital content.  ...  Through the NFC side-channel, a user needs to near the NFC tag to access the security token.  ...  K AP : The asymmetric public key used by the access point. -1 K AP: The asymmetric private key used by the access point. K TTP : An asymmetric public key generated by TTP/CA III.  ... 
doi:10.20894/ijwt.104.005.002.002 fatcat:qinsq5ig35fkdkcsfeoglwnjny
« Previous Showing results 1 — 15 out of 19,179 results