Method to manage a one time password key

M Lansler, S Petit, G Pierquin - US Patent 10,164,954, 2018 - Google Patents
The present invention relates to a method to manage a One Time Password key, referenced
OTP key, used in an OTP algorithm in a user device having access to an unsafe storage …

An enhanced WLAN security system with FPGA implementation for multimedia applications

T Hayajneh, S Ullah, BJ Mohd… - IEEE Systems …, 2015 - ieeexplore.ieee.org
Maintaining a high level of data security with a low impact on system performance is more
challenging in wireless multimedia applications. Protocols that are used for wireless local …

Survey on security scheme and attacking methods of WPA/WPA2

Y Liu, Z **, Y Wang - 2010 6th international conference on …, 2010 - ieeexplore.ieee.org
As the critical security flaw of WEP is discovered, concern of researchers is more and more
attracted by the scheme of WPA/WPA2 which includes 802.1 X, authentication protocol, and …

Keys through ARQ: Theory and practice

Y Abdallah, MA Latif, M Youssef… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
This paper develops a novel framework for sharing secret keys using the Automatic Repeat
reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits …

[PDF][PDF] Analyzing the impact of security protocols on wireless LAN with multimedia applications

T Hayajneh, S Khasawneh, B Mohd… - Proc. of The Sixth …, 2012 - academia.edu
The availability and reasonable cost of broadband Internet made it an attractive and
favorable option to billions of users worldwide. Being a fast service also encourages its …

Improving confidentiality of AES-CCMP in IEEE 802.11 i

I Saberi, B Shojaie, M Salleh… - 2012 Ninth …, 2012 - ieeexplore.ieee.org
This paper proposed a new method for Advanced Encryption Standard-Counter Mode with
Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) to eliminate …

[LIBRO][B] Optimizing IEEE 802.11 i resource and security essentials: for mobile and stationary devices

IS Amiri, P Naraei, I Saberi - 2014 - books.google.com
In the past decade, the number of wireless devices has grown exponentially. Decades ago,
all systems were wired computer systems. Wireless technology was not accessible in mobile …

A review of Artificial Intelligence Emerging technologies and challenges in Block Chain Technology

M Rath - 2019 International Conference on Smart Systems and …, 2019 - ieeexplore.ieee.org
Currently, Block Chain technology is getting more research attention with new
advancements in all sectors of information technology and business for many security …

Enhanced AES-CCMP key structure in IEEE 802.11 i

I Saberi, B Shojaie, M Salleh… - Proceedings of 2011 …, 2011 - ieeexplore.ieee.org
This study is conducted to establish an alternative, creative technique for key structure of
AES-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol …

Artificial Intelligence Incorporated in Business Analytics and Blockchain to Enhance Security

M Rath, SS Tripathy, N Tripathy… - Computational …, 2023 - taylorfrancis.com
Implementing statistical models for business analysis and prediction systems has achieved
great success in business platforms. The high computational power of business intelligence …