Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This article provides a non-formal assessment of the safety of the protocol, which is said to be both effective and resistant to a variety of assaults. The findings of the investigation indicate that the protocol under consideration does not offer user anonymity and that it is susceptible to session key disclosure assault, many-time pad attack, and insider attack. A brand new three-factor authentication protocol has been introduced in order to fulfil all of these needs. This protocol offers a greater level of security by utilizing Physically Unclonable Function (PUF) and Elliptic Curve Cryptography (ECC). This protocol allows for the revocation of smart cards and prevents cloning attacks.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.