Search Results - message authentication system
Search alternatives:
- authentication system »
-
1
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The time of message authentication operation in the IEEE 802.15.4 WSN is decreased by DMAC. …”
Get full text
Get full text
Thesis -
2
Increase throughput of CCM security mode using MKP
Published 2014“…The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. …”
Get full text
Get full text
Article -
3
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
4
Noise induced synchronization of time-delayed semiconductor lasers and authentication based asymmetric encryption.
Published 2013“…An investigation of the system together with a novel scheme for authentication based message encryption process are presented. …”
Get full text
Get full text
Article -
5
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Authenticity Of Characters Portrayal In Islamic Films: A Study On The Message
Published 2024Get full text
Article -
8
Efficient authentication mechanism for defending against reflection-based attacks on domain name system
Published 2020“…In this paper, we proposed the Efficient Distributed-based Defense Scheme (EDDS) to overcome the shortcomings of a centralized-based defense mechanism. By using an authentication message exchange, which is a Challenge-Handshake Authentication Protocol (CHAP)-based authentication mechanism. …”
Get full text
Get full text
Get full text
Article -
9
Plan recognition scheme using multi-factors authentication for smart card online system
Published 2014“…Authentication is one of the essential security features in network communication and ensures the system resources are not obtained by illegal users. …”
Get full text
Conference or Workshop Item -
10
Educational chatting system
Published 2010“…Chatting system is a program developed for students in delivering their message to another student by using the chatting system program. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this manner, the length of the key would not affect the time execution of this algorithm and digital signature in the end of message would increase the authentication between the sender and the recipient.The main steps in this algorithm started with reading the plain text "original message" from the user. …”
Get full text
Get full text
Thesis -
12
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this manner, the length of the key would not affect the time execution of this algorithm and digital signature in the end of message would increase the authentication between the sender and the recipient. …”
Get full text
Get full text
Conference or Workshop Item -
14
Emergency handling system
Published 2008“…In addition, every message that is transmitted through the network in encrypted and authenticated to ensure integrity and authenticity of an emergency call. …”
Get full text
Get full text
Monograph -
15
Token Based Authentication Method Using Bluetooth Enabled Mobile Phone
Published 2004“…Authentication is a mechanism to establish proof of identities; it ensures the right identification of a particular user or a particular system or device. …”
Get full text
Get full text
Thesis -
16
Two factor authentication by using SMS for web based application
Published 2020“…This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. …”
Get full text
Get full text
Get full text
Article -
17
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
Published 2021“…Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. …”
Get full text
Get full text
Article -
18
A new tunnelled EAP based authentication method for WiMAX networks
Published 2013“…This paper proposes a new method called EAP-TTLS-ISRP which embeds the transmission of security messages in a secure tunnel. This authentication method is proposed for a single EAP based authentication to achieve both user and device authentications between Mobile Station (MS) and Authentication Server (AS) by using strong and fast authentication methods. …”
Get full text
Get full text
Conference or Workshop Item -
19
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The block hash of the sending device is transmitted with the message. The receiver would compare the hash value to that stored in the authentication table to authenticate the sender. …”
Get full text
Get full text
Thesis -
20
Adaptive digital watermarking system for authentication of intellectual properties
Published 2011Get full text
Get full text
Get full text
Book Chapter
