A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Object Authentication in the Context of the Internet of Things: A Survey
2020
Journal of Cyber Security and Mobility
Comparisons are based on various criteria which include authentication process characteristics, the underlying architecture, key generation and distribution techniques, supporting IoT challenges, security ...
Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services. ...
Moreover, except for [30, 36, 37] , registration/offline phases are essential phases in the authentication process. ...
doi:10.13052/jcsm2245-1439.932
fatcat:2mufoqa6rjfqhh2p2bd7wwabyy
The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services
2020
Sensors
To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied ...
both to online and offline scenarios. ...
Upon successful authentication towards the identity providers, there are now two possible scenarios. (1) Distributed token generation/signing (for SSO) and (2) distributed P-ABC, mainly for offline scenarios ...
doi:10.3390/s20030945
pmid:32050726
pmcid:PMC7038966
fatcat:ocild5srwndkrco6agnbzk4bru
DEPLOYING OBLIVIOUS PERSONALIZED MOBILE ID PREVIEW
2020
Zenodo
Standardization towards a common scheme is important to ensure wide-spread adoption through cross-country and cross-region interoperability. ...
An advanced design for P-ABCs are distributed P-ABCs (dP-ABC). The dP-ABC Credential Management module on the IdP needs to manage the cryptographic material for the scheme. ...
ObLivious Identity and Management for Private and User-friendly Services [9] are privacy-preserving identity provision services that use distributed cryptography to distribute the functionality and cryptographic ...
doi:10.5281/zenodo.5815964
fatcat:4fourqyf5fdxdc3d5smg7zo2ga
Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks
2010
IEEE wireless communications
., achieving data authentication and non-repudiation). For entity authentication, the public key of each entity must be authentic to all the entities in the network. ...
From the table, we can see the fast verification of the online/offline Rabin scheme makes it more suitable for the efficient authentication required in VANETs. ...
doi:10.1109/mwc.2010.5601954
fatcat:zj2y23tuurgrbjdsha2omo2qsm
A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data
2020
2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)
Firstly, we discussed an overview of Identity management approaches, introducing an architecture overview as well as the relevant actors in such a system and blockchain technology as solution for distributed ...
The authentication and verification of digital identity is essential to achieve the privacy and security of distributed digital identities. ...
For distributed authentication (verification and lookup), certcoin has exploited the kademlia DHT [36] for self-sustaining key-distributor service. ...
doi:10.1109/brains49436.2020.9223312
dblp:conf/brains/GilaniBHC20
fatcat:bqud3palbncrxetmx7g444qrk4
Authentication and encryption in the Snow disease surveillance network
2009
Studies in Health Technology and Informatics
Requirements for the authentication mechanism were collected from General Practitioners (GPs). ...
The paper presents how authentication and encryption is implemented in the Snow disease surveillance network. ...
Because the outbreak management system is the natural place for administering distribution of vaccines, the information distributed within this system needs to be protected. ...
pmid:19745406
fatcat:fbitrnrqm5gd7fa6n7vqnxoxny
Reliable OSPM schema for secure transaction using mobile agent in micropayment system
2013
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce ( ...
The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. ...
For the empirical analysis, let us consider X ID as false name of assumed X party in offline-transaction system distributed by Mobile-agent (M a ), Pub_Key X be public key of X, DS X be digital signature ...
doi:10.1109/icccnt.2013.6726503
fatcat:ug6ibosv4rcqfdcgwtcfrz4hgi
On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography
2015
Journal of Technology Management for Growing Economies
Secure and efficient mutual authentication and key agreement schemes form the basis for any robust network communication system. ...
In this paper, we have analyzed some of the recent password based authentication and key agreement schemes using ECC for various environments. ...
For the purpose of confidentiality and authentication, public key cryptosystems have advantage over symmetric key cryptosystems as they eliminate the problem of key distribution and digital signatures. ...
doi:10.15415/jtmge.2015.61004
fatcat:bldktspbibdtvioxpmwnvrraoe
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
2019
Symmetry
Note that a symmetric key mechanism is adopted for the further data transmission. ...
For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. ...
Offline Registration Phase The offline registration phase is designed for the D2D initialization, which can be divided into the essential key information management and UE registration. ...
doi:10.3390/sym11080969
fatcat:nr33qhzrk5dgrpsdeyulbrifxe
Securing Mobile Ad hoc Networks: Key Management and Routing
2012
International Journal on AdHoc Networking Systems
Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. ...
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes ...
PROPOSED KEY MANAGEMENT SCHEME In this section, we proposed key management system for group based MANETs. Proposed key management scheme includes key generation, distribution and revocation phase. ...
doi:10.5121/ijans.2012.2207
fatcat:aqkbaklb4jathjwndh5ctrbuny
Towards security and QoS optimization in real-time embedded systems
2006
ACM SIGBED Review
To minimize the overhead, we derive the appropriate QoS levels for several key lengths via an offline polynomial time algorithm. ...
When the risk level is raised online, a real-time task can use a longer key and adapt to the corresponding QoS level (derived offline) in O(1) time. ...
Our offline precomputation algorithm for a specific key length is summarized and discussed as follows. 1. ...
doi:10.1145/1279711.1279718
fatcat:fnipigwsxjhezcx6ycwwoxxici
Secure password authentication schemes and their applications
漏えいに強いパスワード認証とその応用
2014
Synthesiology English edition
漏えいに強いパスワード認証とその応用
Passwords are widely used for encrypting files, authenticating remote users on a communication network, and establishing encrypted channels for authenticated users. ...
As countermeasures to "heard or peeked" and "lax setting and management of password," it is recommended to employ twofactor authentication where information other than passwords is used concurrently, in ...
The proposed title is vague and can include all the papers for new authentication and key management that may appear in the future so that you cannot catch the reader's attention. ...
doi:10.5571/syntheng.7.174
fatcat:l3xga473lrf3xeoi6js5nyd2ge
Towards name-based trust and security for content-centric network
2011
2011 19th IEEE International Conference on Network Protocols
For scalable deployment purpose, we further propose to use a hybrid scheme combined with traditional public-key infrastructure (PKI) and IBC. ...
The trust of a content is seamlessly integrated with the verification of the content's integrity and authenticity with its name or prefix, instead of the public key certificate of its publisher. ...
Specifically, a PKG generates and distributes private keys for clients in its local domain or autonomous system (AS), while existing deployed PKI-based trust management infrastructure (e.g., that for DNSSEC ...
doi:10.1109/icnp.2011.6089053
dblp:conf/icnp/ZhangCXWSW11
fatcat:qtosxasupzcqjdhwj54iktbs74
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution
[chapter]
2005
Lecture Notes in Computer Science
In particular, two major security problems of overlay multicast, network access control and group key management, are addressed. ...
We first present a bandwidthefficient scheme, called CRBR, that seamlessly integrates network access control and group key management. ...
They can use their pairwise key for authenticating these KEEPALIVE messages to each other.
C. ...
doi:10.1007/11496137_4
fatcat:km3krqmuh5hmvaqj3jhoeaxewm
HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
Specifically, we developed a cryptographic hardware-acceleration framework for Rapid Authentication (RA) [1], which is a delay-aware offline-online signature scheme for command and control systems. ...
In this paper, we developed Hardware-Accelerated Authentication (HAA) that enables practical realization of delay-aware signatures for vehicular networks. ...
Acknowledgment We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Tesla K40 GPU and Tesla K1 used for this research. ...
doi:10.1109/milcom.2015.7357624
dblp:conf/milcom/SinglaMPY15
fatcat:u2awzmoz5ne67eu73ixugdeoka
« Previous
Showing results 1 — 15 out of 12,692 results