دانلود و نمایش مقالات مرتبط با احراز هویت متقابل::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - احراز هویت متقابل

تعداد مقالات یافته شده: 7
ردیف عنوان نوع
1 A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
پروتکل احراز هویت متقابل منحنی بیضوی امن برای TMIS با کمک ابر-2019
With the fast progress of network communication, its technologies and the developing popularity of telecare medical information system (TMIS), doctors provide treatment to patients via Internet without visiting hospitals. By using mobile device, wireless body area network and cloud based architecture, the patients can gather their physiological information and upload to cloud via their mobile devices. The authenticated doctor provides online treatment to patient at anytime and anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication and authenticated to all the participants before assessing this system. Recently Li et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS. They believed that their scheme secure against all well-known privacy and security attributes. In the proposed work, we reviewed Li et al. authentication protocol and found that it has various security flaws like as message authentication fails in healthcare center upload phase, session key is not possible in healthcare center upload phase, impersonation attack in patient data upload phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in similar environment. The proposed protocol secure against man-in-the-middle attack, patient anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation, message authentication, impersonation attack, session key security and patient unlinkability. We compared the proposed protocol with existing related protocols in same cloud based TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the efficiency in terms of computation and communication costs for cloud-assisted TMIS.
Keywords: Cloud computing | Elliptic curve cryptography | TMIS | Medical data | Mutual authentication
مقاله انگلیسی
2 Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
پروتکل احراز هویت کاربر از راه دور سبک وزن برای شبکه های 5G چند سرور با استفاده از رمزنگاری کلید عمومی عمومی خود گواهی شده-2019
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication protocol needs to be developed for complex 5G networks. In this paper, we propose a lightweight and untraceable authentication protocol for multi-server-based 5G networks. To reduce computational complexity, we employ selfcertified public key cryptography based on elliptic curve cryptography to authenticate the validation of users and servers. Without pairing operations, our scheme could improve performance efficiency. Also, a formal security model is designed to prove that our protocol is secure against forgery attack due to the discrete logarithm and the computational Diffie-Hellman problem. Performance analysis further shows that our protocol has a lower communication and computational overhead. Also, our protocol could support anonymous mutual authentication.
Keywords: Multi-server | Mutual authentication | Lightweight
مقاله انگلیسی
3 An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
رمزنگاری منحنی بیضوی مبتنی بر طرح احراز هویت متقابل برای ارتباطات شبکه هوشمند با استفاده از روش بیومتریک-2019
Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it is accountable for providing power without any interruption. SG is one of the vital components to authorize smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment security and privacy are the major concern for communications. An authentication protocol provides secure communication between users and service provider for security and privacy purpose. Several authentication protocols are available in the literature. However, they are enabled to known security attacks easily or they are not computationally efficient for SG communication. In the present paper, we design an ECC-based mutual authentication protocol for smart grid communication using biometric approach. The present framework satisfy various security features such as replay attack, user anonymity, man in the middle attack, key freshness, message authentication, session key agreement, impersonation attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication and computation costs compared with other existing protocols in SG environment. Therefore, our scheme is convenient for practical application in SG communication
Keywords: Biometric | Elliptic curve cryptography | Fuzzy extractor | Mutual authentication | Smart grid security and privacy
مقاله انگلیسی
4 Enhanced authentication and key management scheme for securing data transmission in the internet of things
تصدیق پیشرفته و برنامه مدیریت کلیدی برای اطمینان از انتقال داده ها در اینترنت اشیا-2019
The Internet of Things (IoT), with its smartness and intelligence, is gradually changing human life by al- lowing everyday objects to be connected to the Internet. With the prevalence of the IoT, wireless sensor networks (WSNs) are attracting worldwide attention, because they cover a wide range of IoT applica- tions. The sensors collect data from the physical world and communicate with each other through wire- less links. Ensuring the security and privacy of WSNs’ communication is challenging. Recently, a secure authentication and key management scheme was proposed to secure data transmission in WSNs. In this paper, we show that this scheme has various security flaws, such as replay attack, denial of service attack, impersonation attack, and lack of mutual authentication and session key agreement. Then, we propose an enhanced scheme to overcome the identified security weaknesses. The security of the enhanced scheme is formally verified using the Burrows–Abadi–Needham logic and the Automated Validation of Internet Security Protocols and Applications tool. Our proposed scheme is more secure, efficient, and suitable for WSN-based IoT applications than recent related methods.
Keywords: Privacy | Mutual authentication | Key agreement | Elliptic curve cryptography | BAN logic | AVISPA
مقاله انگلیسی
5 Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
طرح توافقنامه کلیدی تأیید امن برای خدمات محاسبات ابری سیار توزیع شده-2017
With the rapid development of mobile cloud computing, the security becomes a crucial part of communication systems in a distributed mobile cloud computing environment. Recently, in 2015, Tsai and Lo proposed a privacy-aware authentication scheme for distributed mobile cloud computing services. In this paper, we first analyze the Tsai–Lo’s scheme and show that their scheme is vulnerable to server impersonation attack, and thus, their scheme fails to achieve the secure mutual authentication. In addition, we also show that Tsai–Lo’s scheme does not provide the session-key security (SK-security) and strong user credentials’ privacy when ephemeral secret is unexpectedly revealed to the adversary. In order to withstand these security pitfalls found in Tsai–Lo’s scheme, we propose a provably secure authentication scheme for distributed mobile cloud computing services. Through the rigorous security analysis, we show that our scheme achieves SK-security and strong credentials’ privacy and prevents all well-known attacks including the impersonation attack and ephemeral secrets leakage attack. Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks. More security functionalities along with reduced computational costs for the mobile users make our scheme more appropriate for the practical applications as compared to Tsai–Lo’s scheme and other related schemes. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using the broadly-accepted NS-2 network simulator.
Keywords: Cloud computing | SK-security | Mutual authentication | User untraceability | AVISPA | NS2 simulation
مقاله انگلیسی
6 احراز هویت متقابل در امنیت سیستم پرداخت سیار با استفاده از کد QR رمزنگاری شده براساس زیرساخت کلید عمومی
سال انتشار: 2016 - تعداد صفحات فایل pdf انگلیسی: 5 - تعداد صفحات فایل doc فارسی: 16
تراکنش پرداختی با استفاده تلفن همراه دارای ریسک های احتمالی نیز می باشد. دستگاه های موبایل هنوز امن نیستند و نیاز به توجه بیشتری در منطقه امنیتی دارند. در این مقاله، روش کدهای احراز هویتِ متقابل بین مشتری و بازرگان با استفاده از رمزنگاری کد QR را ارائه می دهیم. کد QR به طور گسترده در تکنولوژی های اخیر مورد استفاده قرار گرفته است. کد QR می تواند اطلاعات بیشتری را از یک بارکد سنتی ذخیره کند. این سیستم امنیتی با استفاده از زیرساخت کلید عمومی (PKI) یک لایه امنیتی اضافی را تضمین می¬کند.
کلمات کلیدی: کد QR | زیرساخت کلید عمومی (PKI) | پرداخت همراه | امنیت
مقاله ترجمه شده
7 A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
یک رویکر برای تأیید هویت کاربر و طرح توافق کلیدی برای شبکه های حسگر بی سیم ناهمگن، بر اساس اوضاع اینترنت-2014
The idea of the Internet of Things (IOT) notion is that everything within the global network is accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in such an environment, since they cover a wide application field. Such interconnection can be seen from the aspect of a remote user who can access a single desired sensor node from the WSN without the necessity of firstly connecting with a gateway node (GWN). This paper focuses on such an environment and proposes a novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks. The proposed scheme enables a remote user to securely negotiate a session key with a general sensor node, using a lightweight key agreement protocol. The proposed scheme ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user. The proposed scheme has been adapted to the resource-constrained architecture of the WSN, thus it uses only simple hash and XOR computations. Our proposed scheme tackles these risks and the challenges posed by the IOT, by ensuring high security and performance features. Keywords Wireless sensor network; Ad hoc; Mutual authentication; Key agreement; Smart card; Internet of Things
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6402 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 6402 :::::::: افراد آنلاین: 64