يعرض 1 - 10 نتائج من 10 نتيجة بحث عن 'based authentication protocol', وقت الاستعلام: 0.05s تنقيح النتائج
  1. 1

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …"
  2. 2

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…This research focus on the security of the communication path between drone and ground station and solving the noted vulnerabilities like stolen-verifier, privileged-insider attacks, and outdated-data-transmission/design flaws often reported in the current authentication protocols for IoD. We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  3. 3
  4. 4

    Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure حسب Shaik Mullapathi Farooq (16869909)

    منشور في 2020
    "…A key agreement protocol based on ID-based authentication mechanism is proposed and analyzed for computational performance. …"
  5. 5
  6. 6

    A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation حسب Usman Khalil (7820876)

    منشور في 2024
    "…Since non-fungibility provided by the ERC721 standard for the cyber-physical systems (CPSs) components such as the admin, user, and IoT-enabled smart device/s in literature is explicitly missing, the proposed DSCoT devised the functionality of identification and authentication of the assets. The proposed identification and authentication mechanism in cyber-physical systems (CPSs) employs smart contracts to generate an authentication access code based on extended non-fungible tokens (NFTs), which are used to authorize access to the corresponding assets. …"
  7. 7
  8. 8

    A hybrid cryptosystem based on WEP for 802.11 networks حسب Haraty, Ramzi A.

    منشور في 2006
    "…It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9

    Improving the security of SNMP in wireless networks حسب Otrok, H.

    منشور في 2017
    "…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 10

    Critical Analysis of International STEM Education Policy Themes حسب Al Quraan, Dr. Elaine J.

    منشور في 2019
    "…The structural implementation global themes include: “subject integration/project-based learning/design-based education, non-traditional assessment, STEM content, time, professional development, and outside support (e.g., businesses and industry). …"
    احصل على النص الكامل
    احصل على النص الكامل