Deniable authentication protocol based on factoring and discrete logarithm problems
A receiver can determine the genuine source of a message using a deniable authentication protocol without having to reveal the identity of the sender to a third party. In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. It is suggested th...
| Main Authors: | Nek Abd Rahman, Normahirah, Ismail, Eddie Shahril, Laham, Mohamed Faris |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
IEEE
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/37758/ |
Similar Items
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Grey is the new black: covert action and implausible deniability
by: Cormac, Rory, et al.
Published: (2018)
by: Cormac, Rory, et al.
Published: (2018)
Logarithmic spin, logarithmic rate and material frame-indifferent generalized plasticity
by: Soldatos, Dimitris, et al.
Published: (2016)
by: Soldatos, Dimitris, et al.
Published: (2016)
Some Tauberian conditions on logarithmic density
by: Kilicman, Adem, et al.
Published: (2019)
by: Kilicman, Adem, et al.
Published: (2019)
Disruption and deniable interventionism: explaining the appeal of covert action and special forces in contemporary British policy
by: Cormac, Rory
Published: (2017)
by: Cormac, Rory
Published: (2017)
Bayesian estimation of two-parameters Rayleigh-logarithmic using Lindley approximation
by: Nazri, Fatin Syazwani, et al.
Published: (2021)
by: Nazri, Fatin Syazwani, et al.
Published: (2021)
An authentication protocol for mobile cellular network
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
Bias field correction-based active contour model for region of interest extraction in digital image
by: Rosli, Nurul Ain Suraya, et al.
Published: (2023)
by: Rosli, Nurul Ain Suraya, et al.
Published: (2023)
The critical role of logarithmic transformation in Nernstian equilibrium potential calculations
by: Sawyer, Jemima E.R., et al.
Published: (2017)
by: Sawyer, Jemima E.R., et al.
Published: (2017)
The logarithm map, its limits and Fréchet means in orthant spaces
by: Barden, D., et al.
Published: (2018)
by: Barden, D., et al.
Published: (2018)
The perceptions on group work among Malaysian pre-university gifted students
by: Faieza Samat,, et al.
Published: (2019)
by: Faieza Samat,, et al.
Published: (2019)
A logarithmic improvement of regularity criterion for the MHD equations in terms of the pressure
by: Chi, M., et al.
Published: (2018)
by: Chi, M., et al.
Published: (2018)
Intelligent sliding mode control using natural logarithm sliding surface
by: Ridhuan Siradj , Fadly Jashi Darsivan
Published: (2010)
by: Ridhuan Siradj , Fadly Jashi Darsivan
Published: (2010)
An accurate spline polynomial cubature formula for double integration with logarithmic singularity
by: Bichi, Sirajo Lawan, et al.
Published: (2016)
by: Bichi, Sirajo Lawan, et al.
Published: (2016)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Ghazali and the problem of authenticity
by: Babu Sahib, Hikmatullah
Published: (2004)
by: Babu Sahib, Hikmatullah
Published: (2004)
A hybrid logarithmic gradient algorithm for poisson noise removal in medical images
by: Khursheed, Shahzad, et al.
Published: (2014)
by: Khursheed, Shahzad, et al.
Published: (2014)
Transcendental singularities for a meromorphic function with logarithmic derivative of finite lower order
by: Langley, J.K.
Published: (2019)
by: Langley, J.K.
Published: (2019)
Zero knowledge protocol network authentication and monitoring
by: Ang, Yong Seng
Published: (2024)
by: Ang, Yong Seng
Published: (2024)
Employment of ex-prisoners with mental health problems, a realistic evaluation protocol
by: Hamilton, Ian S., et al.
Published: (2015)
by: Hamilton, Ian S., et al.
Published: (2015)
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
by: Alezabi, Kamal Ali, et al.
Published: (2020)
by: Alezabi, Kamal Ali, et al.
Published: (2020)
Chover-type laws of the k-iterated logarithm for weighted sums of strongly mixing sequences
by: Trapani, Lorenzo
Published: (2014)
by: Trapani, Lorenzo
Published: (2014)
Generalized Logarithmic Penalty Function Approach For Invex
Nonlinear Constrained Optimization And Its Application
by: Hassan, Mansur
Published: (2020)
by: Hassan, Mansur
Published: (2020)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Global algorithms for nonlinear discrete optimization and discrete-valued optimal control problems
by: Woon, Siew Fang
Published: (2009)
by: Woon, Siew Fang
Published: (2009)
A note on the asymptotic normality of the kernel deconvolution density estimator with logarithmic chi-square noise
by: Zu, Yang
Published: (2015)
by: Zu, Yang
Published: (2015)
Natural logarithm-based sliding mode control for two DOF active engine mounting system
by: Wijaya, Andika Aji, et al.
Published: (2009)
by: Wijaya, Andika Aji, et al.
Published: (2009)
Authentic advice for authentic problems? Legal information in Australian classroom drug education
by: Farrugia, A., et al.
Published: (2017)
by: Farrugia, A., et al.
Published: (2017)
Similar Items
-
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014) -
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016) -
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003) -
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007) -
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)