A NOVEL TECHNIQUE FOR SECURE ENCRYPTED MESSAGES IN MOBILE AND PERVASIVE APPLICATIONS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
More than applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, to propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, to propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.
Authors and Affiliations
Mr. P. Venkateshwar Rao
Computer Networking: A Top Down Approach James F.Kurose, Keith W.Ross – Book Review
In the field of communication, Computer Networking has much of attention. It has become an essential omnipresent technology with explosive growth. There are ample of books accessible for the study and design of c...
MODELING, DESIGN, AND CONTROL OF ASYNCHRONOUS BUCK CONVERTER FOR MOBILE APPLICATION
The aim of this paper is to model and design an open-loop and close-loop asynchronous Buck switching converter for mobile applications. The design of the converter is performed to step-down the input voltage 12V t...
QR CODE BASED ENCRYPTED MATRIX REPRESENTATION FOR ERADICATING HARDWARE AND SOFTWARE KEYLOGGING
The design of secure authentication protocols is quite challenging. Involving human authentication protocols is not easy because of their limited capability of computation and memorization. Keylogging is a major p...
ESAODV: IMPLEMENTATION AND DESIGN OF SECURE AND EFFICIENT AODV FOR WSN
A number of different network technologies are now in these days developed using the ad hoc configuration of networks. Among the wireless sensor network is one of most frequently used network technology for applic...
A STUDY ON MODELING OF E-COMMERCE BASED WEBAPPLICATIONS
The e-commerce industry is increasing at a about 70% each year. According to an October report by Gartner, an American information technology research and advisory firm, ecommerce in India is likely to cross $6 bi...