| Keyword : authentication
|
An IKEv2-Based Hybrid Authentication Scheme for Simultaneous Access Network and Home Network Authentication MyeongJi KO Hyogon KIM Sung-Gi MIN | Publication:
Publication Date: 2022/02/01
Vol. E105-B
No. 2 ;
pp. 250-258
Type of Manuscript:
PAPER
Category: Multimedia Systems for Communications Keyword: authentication, EAPOL, IKEv2, EAP, | | Summary | Full Text:PDF(2.4MB) | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol Daisuke MORIYAMA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A
No. 1 ;
pp. 130-138
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: RFID, authentication, ownership transfer, provable security, | | Summary | Full Text:PDF(233.4KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
|
Key De-Synchronization Attack against Yüksel-Nielson's Key Distribution Protocol for ZigBee Wireless Sensor Networks Chang-Seop PARK | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/03/01
Vol. E97-A
No. 3 ;
pp. 877-880
Type of Manuscript:
LETTER
Category: Cryptography and Information Security Keyword: ZigBee, authentication, Key Establishment, Key De-synchronization, replay attacks, | | Summary | Full Text:PDF(301.2KB) | |
|
Relations among Notions of Privacy for RFID Authentication Protocols Daisuke MORIYAMA Shin'ichiro MATSUO Miyako OHKUBO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A
No. 1 ;
pp. 225-235
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography Keyword: RFID, authentication, security model, | | Summary | Full Text:PDF(688.9KB) | |
|
Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Fushan WEI Zhenfeng ZHANG Chuangui MA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/09/01
Vol. E96-A
No. 9 ;
pp. 1864-1871
Type of Manuscript:
PAPER
Category: Cryptography and Information Security Keyword: gateway, password, authentication, key exchange, | | Summary | Full Text:PDF(952.6KB) | |
| |
|
Secure and Efficient Report Protocol for Networked Smart Grid Systems Using Linear Map Youngsam KIM Joon HEO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/05/01
Vol. E96-A
No. 5 ;
pp. 886-895
Type of Manuscript:
Special Section PAPER (Special Section on Networked Control Systems: Theories & Applications)
Category: Keyword: networked smart grid, authentication, resource-constrained device, linear map, | | Summary | Full Text:PDF(1.5MB) | |
| |
|
Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks Atsushi WASEDA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A
No. 1 ;
pp. 166-170
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations Keyword: quantum cryptography, authentication, | | Summary | Full Text:PDF(353.4KB) | |
|
Anonymous Authentication Scheme without Verification Table for Wireless Environments Ryoichi ISAWA Masakatu MORII | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A
No. 12 ;
pp. 2488-2492
Type of Manuscript:
LETTER
Category: Cryptography and Information Security Keyword: anonymity, authentication, security, wireless communication, | | Summary | Full Text:PDF(92.8KB) | |
| |
| |
| |
| |
| |
|
EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks Saber ZRELLI Nobuo OKABE Yoichi SHINODA | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D
No. 2 ;
pp. 490-502
Type of Manuscript:
Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet)
Category: Keyword: wireless, authentication, handoff, performance, | | Summary | Full Text:PDF(808.6KB) | |
|
An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation Rehana YASMIN Eike RITTER Guilin WANG | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D
No. 1 ;
pp. 126-133
Type of Manuscript:
Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Security Keyword: wireless sensor network, authentication, online/offline signatures, | | Summary | Full Text:PDF(224.4KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
|
Secure Authentication Scheme with Improved Anonymity for Wireless Environments JongHyup LEE Taekyoung KWON | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2011/02/01
Vol. E94-B
No. 2 ;
pp. 554-557
Type of Manuscript:
LETTER
Category: Fundamental Theories for Communications Keyword: access control, identification, authentication, | | Summary | Full Text:PDF(213.8KB) | |
|
Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification Kenta TAKAHASHI Shinji HIRATA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A
No. 1 ;
pp. 233-244
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Biometrics Keyword: biometrics, authentication, cancelable biometrics, template protection, | | Summary | Full Text:PDF(861KB) | |
| |
| |
| |
|
An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Eun-Jun YOON Kee-Young YOO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A
No. 4 ;
pp. 850-853
Type of Manuscript:
LETTER
Category: Reliability, Maintainability and Safety Analysis Keyword: cryptography, authentication, password, key exchange, cryptanalysis, | | Summary | Full Text:PDF(299.6KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication Nozomi ISHIHARA Koki ABE | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A
No. 5 ;
pp. 1045-1054
Type of Manuscript:
PAPER
Category: Information Security Keyword: watermarking, DWT, semi-fragile, authentication, tamper-proofing, | | Summary | Full Text:PDF(768.2KB) | |
| |
| |
|
A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks Kihun HONG Souhwan JUNG | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2006/12/01
Vol. E89-B
No. 12 ;
pp. 3417-3420
Type of Manuscript:
LETTER
Category: Fundamental Theories for Communications Keyword: authentication, mobile network, mobility, roaming, handover, | | Summary | Full Text:PDF(485.1KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications SeongHan SHIN Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A
No. 3 ;
pp. 736-754
Type of Manuscript:
PAPER
Category: Information Security Keyword: entropy of passwords, on-line and off-line attacks, authentication, key establishment protocol, leakage of stored secrets, proactive security, DDH problem, standard model, | | Summary | Full Text:PDF(524.8KB) | |
| |
| |
| |
| |
|
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards Eun-Jun YOON Eun-Kyung RYU Kee-Young YOO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A
No. 1 ;
pp. 319-321
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, password, authentication, security, smart card, | | Summary | Full Text:PDF(63.4KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
|
Three Party Mutual Authentication Schemes for the Virtual Home Environment in the Next Generation Mobile Network Jong-Min JEONG Goo-Yeon LEE Yong LEE | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/11/01
Vol. E86-D
No. 11 ;
pp. 2479-2482
Type of Manuscript:
LETTER
Category: Applications of Information Security Techniques Keyword: mutual, authentication, VHE, password, CHAP, | | Summary | Full Text:PDF(116.4KB) | |
| |
| |
| |
| |
|
Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A
No. 10 ;
pp. 2229-2237
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security Keyword: entropy of passwords, key exchange, authentication, DDH problem, standard model, | | Summary | Full Text:PDF(271.4KB) | |
|
An Efficient Kerberos Authentication Mechanism Associated with X.509 and DNS (Domain Name System) Cheolhyun KIM Ilyong CHUNG | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/09/01
Vol. E85-D
No. 9 ;
pp. 1384-1389
Type of Manuscript:
PAPER
Category: Applications of Information Security Techniques Keyword: Kerberos, authentication, X.509, domain name system, | | Summary | Full Text:PDF(467.6KB) | |
|
Improvement on Peyravian-Zunic's Password Authentication Schemes Jing-Jang HWANG Tzu-Chang YEH | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2002/04/01
Vol. E85-B
No. 4 ;
pp. 823-825
Type of Manuscript:
LETTER
Category: Fundamental Theories Keyword: authentication, password, security, | | Summary | Full Text:PDF(104.7KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
|
High Performance Nonce-Based Authentication and Key Distribution Protocols against Password Guessing Attacks Sung-Ming YEN Meng-Tzung LIU | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A
No. 11 ;
pp. 2209-2217
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security Keyword: authentication, challenge-response, cryptography, key distribution, nonce, off-line dictionary attack, on-line attack, password, trusted third-party, verifiable text attack, | | Summary | Full Text:PDF(782.7KB) | |
|
Mobility Support with Authentic Firewall Traversal in IPv6 Fumio TERAOKA | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 1997/08/25
Vol. E80-B
No. 8 ;
pp. 1132-1137
Type of Manuscript:
INVITED PAPER (Special Issue on Mobile Computing)
Category: Keyword: internet, mobility, IPv6, protocol, firewall, authentication, | | Summary | Full Text:PDF(523.9KB) | |
| |
| |
| |
| |
| |
|
|