Search
نمایش تعداد 1-10 از 58
A Note on Group Authentication Schemes
In literature, there are many different forms of group authentication in conference key establishment protocols. The agents participating in a group need to authenticate each other in order to become assure that every ...
A lightweight key management protocol for secure communication in smart grids
latency in Generic Object-Oriented Substation Event (GOOSE) and Sample Values (SV) protocols. This paper proposes a secure communication protocol based on hash and private key to overcome the security weaknesses while facilitating the key agreement...
A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems
on Internet, they are faced with different security and privacy threats. So, an important challenge is the establishment of a secure key agreement and authentication procedure between the medical servers and patients. Recently, an ECC-based authentication...
Using Security Patterns for Modelling Security Capabilities in Grid Systems
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids
یک طرح مدیریت کلید بر اساس ECC برای ایمن سازی ارتباطات پست های فشار قوی و مرکز کنترل در شبکه های هوشمند
از زمان معرفی برق به خانه ها، شبکه های برق جهانی در خط مقدم پیشرفت های تکنولوژیکی بوده اند. زیرساخت های قدیم سیستم برق که برق را برای خانه ها، کارخانه ها و کسب و کارهای شهر تامین می کنند با سیستم توزیع برق جدید جایگزین می ...
A Secure Authentication and Key Agreement Scheme for Roaming Service with User Anonymity
to breach the security and privacy of data and mobile users. Hence, an authentication and key agreement scheme can be employed to provide secure roaming services. It is well known that the conventional authentication schemes are not suitable for global...
Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems
Authentication and key agreement schemes play a very important role in enhancing
the level of security of telecare medicine information systems (TMISs). Recently, Amin
and Biswas demonstrated that the authentication scheme proposed...