The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication...
At present, many studies focus on the efficiency of handoff among different networks, while research on how to maintain the safety during registration process of handoff is not enough. Unfortunately, mobile node is vulnerable to various security threats and attacks when handover for being lack of protection. A security scheme based on the IPSec protocol which was combined with fast handoff signaling...
There are so many bugs in current financial systems that result in a good loss. In this paper, it discusses on the authentication mechanism and do improves the original system-OPT up to KOPT with detailed design. It also analyzes the benefits of the new financial system.
The world's major banks, financial system because of security vulnerabilities caused by tampering with the accounts and economic circumstances of the loss have occurred; identity authentication technology will be a high degree of attention and applications in major banks and financial systems. Authentication refers to communications between the parties can determine the identity of each other, knowing...
As a type of DoS attacks, resource depletion attacks against IEEE 802.11i protocol exhaust access points (AP) resources. To realize such an attack flooding requests is commonly used. The legitimate user's networks access will be obstructed. This work mainly focuses on request and authentication request flood DoS attacks. A new client-puzzle based DoS-resistant scheme of IEEE 802.11i wireless authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.