Method to manage a one time password key
M Lansler, S Petit, G Pierquin - US Patent 10,164,954, 2018 - Google Patents
The present invention relates to a method to manage a One Time Password key, referenced
OTP key, used in an OTP algorithm in a user device having access to an unsafe storage …
OTP key, used in an OTP algorithm in a user device having access to an unsafe storage …
An enhanced WLAN security system with FPGA implementation for multimedia applications
Maintaining a high level of data security with a low impact on system performance is more
challenging in wireless multimedia applications. Protocols that are used for wireless local …
challenging in wireless multimedia applications. Protocols that are used for wireless local …
Survey on security scheme and attacking methods of WPA/WPA2
Y Liu, Z **, Y Wang - 2010 6th international conference on …, 2010 - ieeexplore.ieee.org
As the critical security flaw of WEP is discovered, concern of researchers is more and more
attracted by the scheme of WPA/WPA2 which includes 802.1 X, authentication protocol, and …
attracted by the scheme of WPA/WPA2 which includes 802.1 X, authentication protocol, and …
Keys through ARQ: Theory and practice
Y Abdallah, MA Latif, M Youssef… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
This paper develops a novel framework for sharing secret keys using the Automatic Repeat
reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits …
reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits …
[PDF][PDF] Analyzing the impact of security protocols on wireless LAN with multimedia applications
The availability and reasonable cost of broadband Internet made it an attractive and
favorable option to billions of users worldwide. Being a fast service also encourages its …
favorable option to billions of users worldwide. Being a fast service also encourages its …
Improving confidentiality of AES-CCMP in IEEE 802.11 i
This paper proposed a new method for Advanced Encryption Standard-Counter Mode with
Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) to eliminate …
Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) to eliminate …
[LIBRO][B] Optimizing IEEE 802.11 i resource and security essentials: for mobile and stationary devices
IS Amiri, P Naraei, I Saberi - 2014 - books.google.com
In the past decade, the number of wireless devices has grown exponentially. Decades ago,
all systems were wired computer systems. Wireless technology was not accessible in mobile …
all systems were wired computer systems. Wireless technology was not accessible in mobile …
A review of Artificial Intelligence Emerging technologies and challenges in Block Chain Technology
M Rath - 2019 International Conference on Smart Systems and …, 2019 - ieeexplore.ieee.org
Currently, Block Chain technology is getting more research attention with new
advancements in all sectors of information technology and business for many security …
advancements in all sectors of information technology and business for many security …
Enhanced AES-CCMP key structure in IEEE 802.11 i
This study is conducted to establish an alternative, creative technique for key structure of
AES-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol …
AES-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol …
Artificial Intelligence Incorporated in Business Analytics and Blockchain to Enhance Security
M Rath, SS Tripathy, N Tripathy… - Computational …, 2023 - taylorfrancis.com
Implementing statistical models for business analysis and prediction systems has achieved
great success in business platforms. The high computational power of business intelligence …
great success in business platforms. The high computational power of business intelligence …