搜索结果: 1-15 共查到“军队指挥学 authentication protocol”相关记录58条 . 查询时间(0.265 秒)
A Chosen Random Value Attack on WPA3 SAE authentication protocol
SAE WPA3 Dragonfly key exchange
2019/7/15
SAE (Simultaneous Authentication of Equals), is a password authenticated key exchange protocol, which is designed to replace the WPA2-PSK based authentication. The SAE Authentication Protocol supports...
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
authentication protocol relay attacks side-channel attacks
2019/1/9
Relay attacks are nowadays well known and most designers of secure authentication protocols are aware of them. At present, the main methods to prevent these attacks are based on the so-called distance...
Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment
M2M communications IIoT Authentication
2018/11/9
The concept of the Industrial Internet of Things (IIoT) can be defined as the integration of smart sensor networks and the Internet of Things (IoT). This technology can be employed in various industri...
Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
Privacy-preserving authentication protocol Physically Unclonable Function Authenticated Encryption
2018/11/2
In this paper, we focus on the design of a novel authentication protocol that preserves the privacy of embedded devices. A Physically Unclonable Function (PUF) generates challenge-response pairs that ...
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
RFID IoT Secret disclosure
2018/5/2
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
Nowadays, RFID systems have earned an important place in our everyday lives. Its adoption is growing in areas where data security or privacy or both must be guaranteed. Since the RFID tag can be clone...
On the security of another CRC based ultralightweight RFID authentication protocol
RFID EPC-C1G2 Cyclic Redundancy Code
2017/11/1
Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have p...
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Mobile commerce RFID Ultra-lightweight
2017/6/9
Over the last few years, more people perform their social activities on mobile devices, such as mobile payment or mobile wallet. Mobile commerce (m-commerce) refers to manipulating electronic commerce...
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Hardware Trojan Horse LCMQ Safe Error
2016/12/26
Radio-Frequency Identification tags are used for several applications requiring authentication mechanisms, which if subverted can lead to dire consequences. Many of these devices are based on low-cost...
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things
RFID Secret Disclosure Authentication
2016/12/10
Recently, Tewari and Gupta have proposed an ultralightweight RFID authentication protocol. In this paper, we consider the security of the proposed protocol and present a passive secret disclosure atta...
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
Internet of things RFID authentication protocols Security and privacy
2016/4/21
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a ...
On the Security of the Algebraic Eraser Tag Authentication Protocol
Algebraic Eraser cryptanalysis tag authentication
2016/2/23
The Algebraic Eraser has been gaining prominence as SecureRF,
the company commercializing the algorithm, increases its marketing
reach. The scheme is claimed to be well-suited to IoT applications bu...
An Optimal Strong Password Authentication Protocol with USB Sticks
Strong Password Authentication Protocol USB Sticks
2016/1/23
Authentication is the process for identify the user authorized or not. The identity contains mainly the username and passwords for verifying the two entities. The authentication information’s are stor...
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Protocol analysis ISO standard PLAID
2016/1/7
The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private
authentication between a smart card and a terminal. Originally developed by a unit of the Australian
Depart...
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
cryptanalysis identification protocol RFID security
2016/1/5
As low-cost RFID tags become more and more ubiquitous, it is necessary to design ultralightweight RFID
authentication protocols to prevent possible attacks and threats. We reevaluate Ahmadian et al.’...