Conferences related to Message authentication

Back to Top

2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )

ETFA focus is on the latest developments and new technologies in the field of industrial and factory automation. The conference aims to exchange ideas with both industry leaders and a variety of experienced researchers, developers, and practitioners from several industries, research institutes, and academia


2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2020 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions.


2020 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.

  • 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premier annual computer vision event comprising the main conference and severalco-located workshops and short courses. With its high quality and low cost, it provides anexceptional value for students, academics and industry researchers.

  • 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.

  • 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conferenceand 27co-located workshops and short courses. With its high quality and low cost, it provides anexceptional value for students,academics and industry.

  • 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry.

  • 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    computer, vision, pattern, cvpr, machine, learning

  • 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. Main conference plus 50 workshop only attendees and approximately 50 exhibitors and volunteers.

  • 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry.

  • 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Topics of interest include all aspects of computer vision and pattern recognition including motion and tracking,stereo, object recognition, object detection, color detection plus many more

  • 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Sensors Early and Biologically-Biologically-inspired Vision, Color and Texture, Segmentation and Grouping, Computational Photography and Video

  • 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Concerned with all aspects of computer vision and pattern recognition. Issues of interest include pattern, analysis, image, and video libraries, vision and graphics, motion analysis and physics-based vision.

  • 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Concerned with all aspects of computer vision and pattern recognition. Issues of interest include pattern, analysis, image, and video libraries, vision and graphics,motion analysis and physics-based vision.

  • 2008 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2007 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2006 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2005 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE International Conference on Industrial Technology (ICIT)

ICIT focuses on industrial and manufacturing applications of electronics, controls, communications, instrumentation, and computational intelligence.


More Conferences

Periodicals related to Message authentication

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals

Most published Xplore authors for Message authentication

Back to Top

Xplore Articles related to Message authentication

Back to Top

Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks

2009 International Symposium on Information Engineering and Electronic Commerce, 2009

The black hole attack is one of the security attacks that occur in mobile ad hoc networks (MANETs). In this article, the routing security issues and the problem of coordinated attack by multiple black holes acting in group in MANET are addressed in detail. Two authentication mechanisms, based on the hash function, the message authentication code (MAC) and the pseudo ...


High throughput implementation of the new secure hash algorithm through partial unrolling

IEEE Workshop on Signal Processing Systems Design and Implementation, 2005., 2005

A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm is proposed. The resulted design can be easily embedded to operate in HMAC IP cores, providing a high degree of security. The proposed implementation does not introduce significant area penalty, compared to other competitive designs. However the achieved throughput presents an increase compared to ...


Chaos-based message authentication code for remote monitoring applications

2005 IEEE International Conference on Industrial Technology, 2005

In this paper, a novel chaos-based message authentication coding scheme is proposed for remote monitoring applications. With the use of high-dimensional chaotic map, a keyed hash function is constructed so that authentication code of any arbitrary message can be generated. The performance analysis of the proposed system is presented and its practical usage is demonstrated by a remote monitoring system


A Study on Secure Chip for Message Authentication between a Smart Meter and Home Appliances in Smart Grid

2013 International Conference on IT Convergence and Security (ICITCS), 2013

Recently, a number of studies are underway about the smart grid for the demand what efficient power management. For these power management in smart grid environments, there are required a system that it can be safely stored and sent various information. In this paper, the user oriented side will be discussed from among the systems that it can be controlled ...


A Novel Fast Hybrid Cryptographic System: MARS4

2006 Annual IEEE India Conference, 2006

A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm "MAJE4" and the popular asymmetric key algorithm "RSA". The MAJE4 algorithm is used for encryption/decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as ...


More Xplore Articles

Educational Resources on Message authentication

Back to Top

IEEE-USA E-Books

  • Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks

    The black hole attack is one of the security attacks that occur in mobile ad hoc networks (MANETs). In this article, the routing security issues and the problem of coordinated attack by multiple black holes acting in group in MANET are addressed in detail. Two authentication mechanisms, based on the hash function, the message authentication code (MAC) and the pseudo random function (PRF), are proposed to provide fast message verification and group identification, identify multiple black holes cooperating with each other and to discover the safe routing avoiding cooperative black hole attack.

  • High throughput implementation of the new secure hash algorithm through partial unrolling

    A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm is proposed. The resulted design can be easily embedded to operate in HMAC IP cores, providing a high degree of security. The proposed implementation does not introduce significant area penalty, compared to other competitive designs. However the achieved throughput presents an increase compared to commercially available IP cores that range from 43%-1830%.

  • Chaos-based message authentication code for remote monitoring applications

    In this paper, a novel chaos-based message authentication coding scheme is proposed for remote monitoring applications. With the use of high-dimensional chaotic map, a keyed hash function is constructed so that authentication code of any arbitrary message can be generated. The performance analysis of the proposed system is presented and its practical usage is demonstrated by a remote monitoring system

  • A Study on Secure Chip for Message Authentication between a Smart Meter and Home Appliances in Smart Grid

    Recently, a number of studies are underway about the smart grid for the demand what efficient power management. For these power management in smart grid environments, there are required a system that it can be safely stored and sent various information. In this paper, the user oriented side will be discussed from among the systems that it can be controlled and managed these power. There are devices of various types in the home environments which user live. And it is sent and received all power information as these modules are connected on the smart meters. In this process, it is possible an impersonation attack and a data forgery attack. In this paper, we analyze the security requirements in earlier smart grid environments and then also, propose a certification structure and a secure chip design for efficient message authentication between a smart meter and home appliances.

  • A Novel Fast Hybrid Cryptographic System: MARS4

    A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm "MAJE4" and the popular asymmetric key algorithm "RSA". The MAJE4 algorithm is used for encryption/decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA

  • Fast authentication codes based on random polynomial residue classes

    The verification of the authenticity of a text document or a datafile is one of the main applications of cryptographic techniques. A common used technique for this purpose is the application of a message authentication code (MAC). Usually the MAC computation has to be done in software. Based on the relationship between error-correcting codes and so-called families of almost universal hash functions, and the error-correcting codes using polynomial residue classes we describe an efficient procedure for a MAC computation which is much faster than the standard MAC constructions using MD5 or SHA and uses much less key bits than the fast MACs based on bucket hashing.

  • Digital signatures

    Many traditional and newer businesses and applications have recently been carrying out enormous amounts of electronic transactions, which have led to a critical need for protecting the information from being maliciously altered, for ensuring the authenticity, and for supporting nonrepudiation. Just as signatures facilitate validation and verification of the authenticity of paper documents, digital signatures serve the purpose of validation and authentication of electronic documents. This technology is rather new and emerging and is expected to experience growth and widespread use in the coming years.

  • FPGA implementation of a 2G fibre channel link encryptor with authenticated encryption mode GCM

    The Galois/counter mode (GCM) algorithm enables fast encryption combined with per-packet message authentication. This paper presents an FPGA implementation of a complete bidirectional 2 Gbps fibre channel link encryptor hosting two area-optimized GCM cores for concurrent authenticated encryption and decryption. The proposed architecture fits into one Xilinx Virtex-4 device. Measurements in a working network link point out that per-packet authentication results in a speed decrease up to 20% of the channel capacity for a reference frame length of 256 bits. Two methods of frame encryption are investigated to reduce the required GCM overhead and to exploit different network configurations.

  • An Improved Tripartite Authenticated Key Agreement Protocol from Pairings

    Key agreement protocols are essential for secure communications in open and distributed environment. The study of tripartite key agreement has great theoretical and practical significance. Shim and Woo pointed out that the four tripartite authenticated key agreement protocols proposed by Al-Riyami and Paterson were insecure. Modifying the communication messages, an active adversary is able to calculate the session key. Therefore, we propose an improved TAK protocol (TAK-V) resisting all known active attacks. Finally, we analyze the security and computation efficiency.

  • Integrity protection in UMTS Radio Access Network - Simulation approach under OPNET

    In previous simulation work [1,2], we were interested in the confidentiality feature in the UMTS Network Access, especially, in the study of its implementation in specific sub-layers and the simulation of its mechanism within a UTRAN network. In the present paper, a special interest is given to the integrity protection of signaling data transmitted between the RNC and the UE. Our current research aims to examine exactly where the integrity mechanism occurs in the protocol stack of an UMTS network. And then introduce this security feature in the OPNET Modeler which is used to give a simulation approach of the use of the UTRAN Integrity feature between RNC and UE. This paper is organized as follows. First, a brief description of the UMTS Integrity mechanism is given. Then, we will describe our simulation approach and we will focus on the changes made to mobile station and RNC node models in order to implement the Integrity feature in both sides.



Standards related to Message authentication

Back to Top

IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications

The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...


IEEE Standard for Message Sets for Vehicle/Roadside Communications

Research, compile, and consolidate information leading to the publication of a standard for exchanging DSRC information, providing for bi-directional message transmission and device control, in a manner which is compatible with but independent of the ASTM efforts to specify DSRC Layers 1 and 2. This will entail specifying the transponder resources, the transponder resource manager, the application message sets, and ...


Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications

The scope of this standard is to define one medium access control (MAC) and several physical layer (PHY) specifications for wireless connectivity for fixed, portable, and moving stations (STAs) within a local area.



Jobs related to Message authentication

Back to Top