Sciweavers

CORR
2012
Springer
162views Education» more  CORR 2012»
12 years 8 months ago
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authen...
Mohammad Zabihi, Ramin Shaghaghi, Mohammad Esmail ...
IJNSEC
2008
66views more  IJNSEC 2008»
14 years 13 days ago
Improving the Novikov and Kiselev User Authentication Scheme
Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-K...
Min-Ho Kim, Çetin Kaya Koç
ICIP
2009
IEEE
15 years 1 months ago
Perfomance Analysis Of The Fridrich-goljan Self-embedding Authentication Method
A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the det...