Search Results - Message authentication system

Search alternatives:

Refine Results
  1. 1

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The time of message authentication operation in the IEEE 802.15.4 WSN is decreased by DMAC. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Increase throughput of CCM security mode using MKP by Ahmad Zulkarnain, Zuriati

    Published 2014
    “…The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Noise induced synchronization of time-delayed semiconductor lasers and authentication based asymmetric encryption. by Banerjee, Santo, Kamel Ariffin, Muhammad Rezal

    Published 2013
    “…An investigation of the system together with a novel scheme for authentication based message encryption process are presented. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Efficient authentication mechanism for defending against reflection-based attacks on domain name system by Hasan, Dana, Hama Amin, Rebeen R., Hussin, Masnida

    Published 2020
    “…In this paper, we proposed the Efficient Distributed-based Defense Scheme (EDDS) to overcome the shortcomings of a centralized-based defense mechanism. By using an authentication message exchange, which is a Challenge-Handshake Authentication Protocol (CHAP)-based authentication mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Plan recognition scheme using multi-factors authentication for smart card online system by Mohd Ariffin, Noor Afiza, Mohd Sani, Nor Fazlida

    Published 2014
    “…Authentication is one of the essential security features in network communication and ensures the system resources are not obtained by illegal users. …”
    Get full text
    Conference or Workshop Item
  10. 10

    Educational chatting system by Ng, Eng Chui

    Published 2010
    “…Chatting system is a program developed for students in delivering their message to another student by using the chatting system program. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this manner, the length of the key would not affect the time execution of this algorithm and digital signature in the end of message would increase the authentication between the sender and the recipient.The main steps in this algorithm started with reading the plain text "original message" from the user. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this manner, the length of the key would not affect the time execution of this algorithm and digital signature in the end of message would increase the authentication between the sender and the recipient. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Emergency handling system by Kamat, Maznah, Zainal, Anazida, Kadir, Rashidah

    Published 2008
    “…In addition, every message that is transmitted through the network in encrypted and authenticated to ensure integrity and authenticity of an emergency call. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Token Based Authentication Method Using Bluetooth Enabled Mobile Phone by Abdel Hameed Mokhtar, Rania

    Published 2004
    “…Authentication is a mechanism to establish proof of identities; it ensures the right identification of a particular user or a particular system or device. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Two factor authentication by using SMS for web based application by Hamid Ali, Firkhan Ali, Mohammad Hanza, Mohammad Zaim, Mohd Sukri, Mohd Khairul Amin

    Published 2020
    “…This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. …”
    Get full text
    Get full text
    Article
  18. 18

    A new tunnelled EAP based authentication method for WiMAX networks by Alezabi, Kamal Ali Ahmed, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2013
    “…This paper proposes a new method called EAP-TTLS-ISRP which embeds the transmission of security messages in a secure tunnel. This authentication method is proposed for a single EAP based authentication to achieve both user and device authentications between Mobile Station (MS) and Authentication Server (AS) by using strong and fast authentication methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…The block hash of the sending device is transmitted with the message. The receiver would compare the hash value to that stored in the authentication table to authenticate the sender. …”
    Get full text
    Get full text
    Thesis
  20. 20