Search Results - message authentication _

Refine Results
  1. 1

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The time of message authentication operation in the IEEE 802.15.4 WSN is decreased by DMAC. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol by Jaisan S M, Ashish

    Published 2024
    “…This study proposes SECS/GEM-AE, a mechanism for securing SECS/GEM data messages using AES-GCM encryption and evaluates its performance against the standard SECS/GEM protocol and SECS/GEMsec, a security mechanism proposed to authenticate SECS/GEM messages.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A lightweight secure authentication for vehicular ad-hoc networks by message encapsulation and trusted authority dependency-less scheme / Tarak Nandy by Tarak , Nandy

    Published 2022
    “…This proposed method, in return, needs less message transfer during authentication as well as communication. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is well known that the existing weak mechanism for authenticating binding update messages is one of the biggest security weaknesses in MIPv6. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine by Mat Isa, Mohd Anuar, Ahmad, Miza Mumtaz, Mohd Sani, Nor Fazlida, Hashim, Habibah, Mahmod, Ramlan

    Published 2014
    “…In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Authenticity Of Characters Portrayal In Islamic Films: A Study On The Message by Osama Kanaker, Rosidayu Sabran, Suria Hani A. Rahman, Salah Mohamed Zaki Ibrahim

    Published 2024
    “…The objectives of this study are to identify the main characters of The Message and to test the authenticity of the portrayal of the characters of The Message. …”
    Get full text
    Article
  11. 11

    Increase throughput of CCM security mode using MKP by Ahmad Zulkarnain, Zuriati

    Published 2014
    “…The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. …”
    Get full text
    Get full text
    Article
  12. 12

    A Chaos-Based Authenticated Cipher with Associated Data by Je, Sen Teh, Samsudin, Azman

    Published 2017
    “…AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. …”
    Get full text
    Get full text
    Article
  13. 13

    A Chaos-Based Authenticated Cipher with Associated Data by Je, Sen Teh, Samsudin, Azman

    Published 2017
    “…AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] by Mat Abu, Nur Ainaa, Mohamad Sarif, Siti Nurfazliana, Mohammad Zuki, Intan Nur Athirah, Udin, Md Nizam

    Published 2021
    “…Cryptography is a method that guarantees the authenticity and integrity of a message between the communication parties. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Authentication process enhancements in WiMAX networks by Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin, Jamalipour, Abbas

    Published 2016
    “…This process allows the receiver (whether base station or subscriber station) of a packet to be confi- dent of the identity of the sender and the integrity of the message. Most attacks will attempt to violate the authentication process. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A new tunnelled EAP based authentication method for WiMAX networks by Alezabi, Kamal Ali Ahmed, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2013
    “…This paper proposes a new method called EAP-TTLS-ISRP which embeds the transmission of security messages in a secure tunnel. This authentication method is proposed for a single EAP based authentication to achieve both user and device authentications between Mobile Station (MS) and Authentication Server (AS) by using strong and fast authentication methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing by Laghari, Shams Ul Arfeen

    Published 2023
    “…This thesis proposes SECS/GEM Security Mechanism (SGSM) that offers authentication, integrity, and protection against cyber-attacks. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A threshold authenticated encryption scheme using hybrid problems by Mohamad, Mohd Saiful Adli, Ismail, E. S.

    Published 2014
    “…In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems.We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. …”
    Get full text
    Get full text
    Get full text
    Article