Identity-based anonymous remote authentication scheme for GLOMONETS
Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study an...
Saved in:
Main Author: | Goh, Yong Rui. |
---|---|
Other Authors: | Ma Maode |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/54458 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Implementation of authentication scheme for GNSS signal using Raspberry Pi
by: Neo, Zhen Ting
Published: (2022) -
Linux-based remote monitoring system
by: Wang, Yi.
Published: (2010) -
QR code security authentication attendance system
by: Lee, Wai Seng
Published: (2023) -
Novel JavaCard-based authentication system for secured transactions on the internet (JCAS)
by: Ng, Li Huang.
Published: (2008) -
Efficient group signature and identity-based signature schemes
by: Cui, Shi
Published: (2008)