55,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

This article provides a non-formal assessment of the safety of the protocol, which is said to be both effective and resistant to a variety of assaults. The findings of the investigation indicate that the protocol under consideration does not offer user anonymity and that it is susceptible to session key disclosure assault, many-time pad attack, and insider attack. A brand new three-factor authentication protocol has been introduced in order to fulfil all of these needs. This protocol offers a greater level of security by utilizing Physically Unclonable Function (PUF) and Elliptic Curve…mehr

Produktbeschreibung
This article provides a non-formal assessment of the safety of the protocol, which is said to be both effective and resistant to a variety of assaults. The findings of the investigation indicate that the protocol under consideration does not offer user anonymity and that it is susceptible to session key disclosure assault, many-time pad attack, and insider attack. A brand new three-factor authentication protocol has been introduced in order to fulfil all of these needs. This protocol offers a greater level of security by utilizing Physically Unclonable Function (PUF) and Elliptic Curve Cryptography (ECC). This protocol allows for the revocation of smart cards and prevents cloning attacks.
Autorenporträt
Dr Rajinder Vir Currently working as Assistant Professor in Department of Computer Science and Engineering, Lovely Professional University. She is having total Teaching Experience of more than 15 years. She is actively researching in Wireless Sensor Network and has 12 publications in reputed journals.