ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Better Authentication Methods For Mobile Computing

Journal: GRD Journal for Engineering (Vol.1, No. 6)

Publication Date:

Authors : ; ; ;

Page : 33-35

Keywords : Authentication; unconditional security; computational security; universal hash-function families; pervasive computing.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Today’s many application rely on small devices that can interact with each other through communication network. In this project we are proposing two new methods for authenticating encrypted message that are directed to assemble the requirements of mobile application. In this applications, the integrity and confidentiality of communicated messages are required. To getting benefit of that fact that the messages to be authenticated must also be encrypted, we propose provably methods for safe authentication codes that are more efficient than any message authentication code. The key idea behind the proposed techniques is to exert the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using single authentication primitives.

Last modified: 2016-05-15 18:00:43