Using Subgraph Isomorphism as a Zero Knowledge Proof Authentication in Timed Wireless Mobile Networks

In networks with sensitive resources and time critical missions, user identification and authentication is essential and critical for all secure access communications originating from outside into the networks. However, there are networks and times when entity identification is not required and indeed in some networks, for the security of the outside entity seeking authentication, identity must not be revealed thus preserving the secrecy and privacy of such entities. Zero Knowledge Protocol (ZKP) using subgraph isomorphism to authenticate new entities requiring entry into existing mobile network while preserving entity privacy and identity works well in these instances.

Provided by: International Journal of Computing and ICT Research Topic: Mobility Date Added: Oct 2010 Format: PDF

Find By Topic